Tag: quantum computing advancements

  • Best Internet Providers in Camden, New Jersey

    Best Internet Providers in Camden, New Jersey


    What is the best internet provider in Camden?

    Verizon Fios is CNET’s pick for the best internet service provider in Camden, New Jersey, as it offers fiber-optic coverage to most households in Camden. According to the latest data from the Federal Communications Commission, Verizon Fios serves 89% of Camden residents. Fios also has one of the fastest internet plans in the area, offering gigabit speeds across the city.

    Are you looking for speed? Comcast’s Xfinity takes the trophy for the fastest internet in the area. The cable internet provider offers multi-gigabit speeds of up to 2,100 megabits per second for $105 monthly. While that isn’t cheap, the cost per Mbps of its 2-gigabit plan is a very cheap 5 cents per Mbps.

    If you need more affordable plans, the cheapest internet in Camden is a four-way tie between Verizon Fios, Verizon 5G, Hughesnet and T-Mobile, starting at $50. However, you can bundle a mobile plan at Verizon and T-Mobile to get internet as low as $35. Watch out for a price increase after the promo period ends and additional equipment fees.

    Camden internet providers compared

    Provider Internet technology Monthly price range Speed range Monthly equipment costs Data cap Contract CNET review score
    Hughesnet
    Read full review
    Satellite $50-$95 ($75-$120 after 12 months) 50-100Mbps $15-$20 a month or $300-$450 one-time purchase 100-200GB 2-years 6
    Starlink
    Read full review
    Satellite $120; $140-$500 (Priority); $150-$5,000 (Mobile) 25-220Mbps $599 one-time purchase (or $2,500 for Priority) Unlimited; 40GB-5TB (Priority) None 6.5
    T-Mobile Home Internet
    Read full review
    Fixed wireless $50-$70 ($35-$55 for eligible Go5G Plus and Magenta Max mobile customers) 72-245Mbps None None None 7.4
    Verizon 5G Home Internet
    Read full review
    Fixed wireless $50-$70 ($35-$45 with qualifying Verizon 5G mobile plans) 50-1,000Mbps (varies by location) None None None 7.2
    Verizon Fios
    Read full review
    Fiber $50-$110 ($35-$95 with select 5G mobile plans) 300-2,300Mbps None None None 7.6
    Viasat
    Read full review
    Satellite $120 Up to 150Mbps $15 or $250 one-time purchase None None 6.1
    Xfinity
    Read full review
    Cable $55-$105 400-2,100Mbps $15-$25 included in some plans None 1-year 7

    Show more (2 items)

    Source: CNET analysis of provider data.

    What’s the cheapest internet plan in Camden?

    Provider Starting price Max download speed Monthly equipment fee
    Hughesnet
    Read full review
    $50 ($75 after 12 months) 50Mbps $15 a month or $300 one-time purchase
    Verizon Fios 300Mbps
    Read full review
    $50 ($35 with select 5G mobile plans) 300Mbps None
    Verizon 5G Home Internet
    Read full review
    $50 ($35 for eligible mobile customers) 300Mbps None
    T-Mobile Home Internet
    Read full review
    $50 ($35 with eligible mobile plans) 245Mbps None
    Xfinity Connect More
    Read full review
    $55 400Mbps $15 gateway rental (optional)

    Show more (0 item)

    Source: CNET analysis of provider data.

    gettyimages-1334918655.jpg

    The Benjamin Franklin Bridge spans the Delaware River from Philadelphia to Camden, New Jersey.

    Sean Pavone/Getty Images

    How to find internet deals and promotions in Camden

    The best internet deals and top promotions in Camden depend on what discounts are available during a given time. Most deals are short-lived, but we look frequently for the latest offers. 

    How many members of your household use the internet?

    Camden internet providers, such as T-Mobile and Xfinity, may offer lower introductory pricing or streaming add-ons for a limited time. Others, like Verizon Fios, run the same standard pricing year-round.  

    For a more extensive list of promos, check out our guide on the best internet deals. 

    Fastest internet plans in Camden

    Provider Starting price Max download speed Max upload speed Data cap Connection
    Xfinity Gigabit X2
    Read full review
    $105 2,100Mbps 300Mbps None Cable
    Xfinity Gigabit
    Read full review
    $85 1,100Mbps 300Mbps None Cable
    Verizon Fios 1 Gig
    Read full review
    $90 ($75 with select 5G mobile plans) 940Mbps 880Mbps None Fiber
    Verizon Fios 2 Gig
    Read full review
    $110 ($95 with select 5G mobile plans) 2,300Mbps 1,500Mbps None Fiber

    Show more (0 item)

    Source: CNET analysis of provider data.

    What’s a good internet speed?

    Most internet connection plans can now handle basic productivity and communication tasks. If you’re looking for an internet plan that can accommodate videoconferencing, streaming video or gaming, you’ll have a better experience with a more robust connection. Here’s an overview of the recommended minimum download speeds for various applications, according to the FCC. Note that these are only guidelines and that internet speed, service and performance vary by connection type, provider and address.

    For more information, refer to our guide on how much internet speed you really need.

    • 0 to 5Mbps allows you to tackle the basics: browsing the internet, sending and receiving email and streaming low-quality video.
    • 5 to 40Mbps gives you higher-quality video streaming and videoconferencing.
    • 40 to 100Mbps should give one user sufficient bandwidth to satisfy the demands of modern telecommuting, video streaming and online gaming. 
    • 100 to 500Mbps allows one to two users to simultaneously engage in high-bandwidth activities like videoconferencing, streaming and online gaming. 
    • 500 to 1,000Mbps allows three or more users to engage in high-bandwidth activities at the same time.

    How CNET chose the best internet providers in Camden

    Internet service providers are numerous and regional. Unlike the latest smartphone, laptop, router or kitchen tool, it’s impractical to personally test every ISP in a given city. What’s our approach? We start by researching the pricing, availability and speed information, drawing on our own historical ISP data, the provider sites and mapping information from the Federal Communications Commission at FCC.gov.

    It doesn’t end there: We go to the FCC’s website to check our data and ensure we consider every ISP that provides service in an area. We also input local addresses on provider websites to find specific options for residents. We look at sources, including the American Customer Satisfaction Index and J.D. Power, to evaluate how happy customers are with an ISP’s service. ISP plans and prices are subject to frequent changes; all information provided is accurate as of publication.

    Once we have this localized information, we ask three main questions:

    1. Does the provider offer access to reasonably fast internet speeds?
    2. Do customers get decent value for what they’re paying?
    3. Are customers happy with their service?

    While the answers to those questions are often layered and complex, the providers that come closest to “yes” on all three are the ones we recommend. When selecting the cheapest internet service, we look for the plans with the lowest monthly fee, although we also factor in things like price increases, equipment fees and contracts. Choosing the fastest internet service is relatively straightforward. We look at advertised upload and download speeds and consider real-world speed data from sources like Ookla and FCC reports. (Disclosure: Ookla is owned by the same parent company as CNET, Ziff Davis.)

    To explore our process in more depth, visit our how we test ISPs page.

    Internet providers in Camden FAQs

    What is the best internet service provider in Camden?

    Verizon Fios is the best internet provider in Camden. Verizon Fios offers fiber-optic coverage to 74% of households in Camden, according to the latest data from the FCC.

    Is fiber internet available in Camden?

    Yes, fiber internet is available to 81% of Camden households, according to the FCC data. Verizon Fios is the main fiber provider in the city.

    What is the cheapest internet provider in Camden?

    Camden residents don’t have access to internet plans under $50, so the cheapest plans in the area are provided by Verizon, T-Mobile and HughesNet. However, if you have an eligible mobile plan at Verizon or T-Mobile, you can get your monthly internet bill down to as little as $35 per month.

    Which internet provider in Camden offers the fastest plan?

    Verizon Fios offers a 2 gigabit speed tier that is similar in comparison to Xfinity’s top plans but has a faster upload speed than any of Xfinity’s tiers. Xfinity’s Gigabit X2 plan offers 2,100Mbps in download speeds and 300Mbps in upload.




  • Best places to buy refurbished electronics in 2025

    Best places to buy refurbished electronics in 2025


    Table of Contents

    Before tariffs get you down, brush up on the best places to buy refurbished electronics. And keep checking Mashable for our latest tariff news and explainers, from delayed Nintendo Switch 2 preorders to reports of iPhone 16 panic buying.

    Do you feel a primal urge to buy the newest iPhone every year? That feeling was dangerous even when tariffs weren’t a thing. But it’s becoming a nasty habit to have with the fast-approaching May 2 reciprocal tariff deadline. President Donald Trump’s tariff policy has caused economic chaos and rising prices, and consumer tech is one of the hardest-hit industries.

    Though we don’t know exactly how tariffs will affect the price of iPhones, laptops, and other gadgets, they could have wide-ranging effects. It’s likely that most of us will have to upgrade or replace a device at least once during this extra expensive time.

    SEE ALSO:

    The 2025 guide to recycling electronics, beauty empties, and clothing

    Burning “stock market today” into your Google search history and trying to shop accordingly probably isn’t a sustainable approach to saving money. Rather, flip to the most important page in the tariff survival guide: Buying refurbished.

    It makes so much sense when you think about it. Tariffs and related policy changes could quickly infiltrate the tech space like cordyceps in The Last of Us. Electronic devices are composed of so many different materials, many of which are produced in countries facing new levies on imports to the U.S. So, buying a device that’s already in circulation is one surefire way to fly under the radar of these tariffs. Plus, you get bonus environmental points.

    What are the advantages of buying refurbished?

    FWIW, being a savvy refurbished shopper is a skill everyone should be honing, regardless of the current price hike situation. If you do it right, buying refurbished is not only an underrated money-saving hack but also a simple way to be a more sustainable consumer. Refurbishing electronics extends their lifespan by years and lowers the number of electronics leaking toxins into the ground through landfills. (This is what Julia Fox was talking about when she stepped out rocking a CD Walkman as a purse in honor of the Right to Repair movement.)

    Refurbished items are naturally priced lower than brand new items, but if you’re looking for further discounts, we have a running list of refurbished tech deals, too.

    Below, we’re outlining the best places to buy refurbished electronics online. We’ll compare general retailers that sell a variety of devices and brands, then dive into the refurbished programs offered by big brands like Apple and Dyson. We’ve also noted warranty and return information.

    SEE ALSO:

    As tariffs come for apparel, learn how to sell your clothes online

    Best places to buy refurbished electronics

    Woot

    What is Woot? This Amazon-owned daily deals retailer offers steep, short-term discounts on both brand-new and refurbished items. The unusually low prices are often joined by a timer counting down the number of hours you have left to score the item at that price. Plus, because of the Amazon connection, Prime members can get free shipping with their Woot purchases.

    Woot’s inventory is as, let’s say, whimsical as the website’s name and overall vibes. The electronics selection spans from smartphones to TVs and vacuums to cameras (both security and photography), with refurbished gadgets from brands like Apple, MSI, Dyson, and JBL.

    But gadgets are hardly Woot’s only specialty — the rest of the site is filled to the brim with the most random assortment of deals, from discounted fancy cookware to boxes of La Croix and weirdly cheap Hunter rain boots. It has the chaotic energy of a Target clearance section, but the items are legit.

    What can you buy? Refurbished Mac Mini computers, Google Pixel phones, Amazon Fire HD tablets, plus apparel, shoes, and bedding

    Back Market

    Back Market is a reputable, sustainability-focused marketplace for buying refurbished devices, as well as selling and trading in old devices. The ongoing goal? To end fast tech. Like fast fashion but for electronics, Backmarket says that “fast tech thrives on disposability, pushing consumers into an endless upgrade cycle with devices designed to become obsolete within years.”

    Mashable Light Speed

    All refurbished devices on Back Market’s virtual shelves have gone through Back Market’s Verified Refurbished System. You can spin the interactive Verified Refurbished wheel for a more granular breakdown of how Back Market inspects items in different categories and classifies their resale condition. (For instance, Back Market phone refurbs in “excellent” condition are guaranteed to have a minimum of 80% battery health and 10% charge capacity.) Many listings also have devices available in Fair, Good, or Excellent condition at different price points — you can decide whether you want to pay $199 or upwards of $250 for a refurbished Nintendo Switch.

    What can you buy? Back Market has lots of refurbished iPhones, Windows laptops, and gaming consoles

    Best Buy Refurbished Electronics Outlet

    Best Buy’s Refurbished Electronics Outlet features pages and pages of refurbished devices, all certified by Best Buy’s own Geek Squad tech support service. Just as Best Buy likely comes to mind when shopping for a brand-new version of a big-name device, Best Buy’s refurb variety is made up of the same heavy hitters. There are PS4s, a ton of laptops, like-new headphones, all things Apple, and even some refurbished Ray-Ban Meta glasses. Plus, Best Buy has massive sales — up to 50% off — on its outlet items all the time.

    And if you’re looking to refurbish or repair something you already have rather than buy something, Geek Squad is helpful there, too. Depending on the size of the device, you can take it into a Best Buy location for in-store fixes, or have Geek Squad come to your home to diagnose large appliances.

    What can you buy? Virtually anything you can buy new at Best Buy you can also find at the Best Buy Refurbished Outlet, though the selection leans toward past-generation items.

    Amazon Renewed

    The Amazon Renewed storefront has a large selection of its own devices like Kindles and Fire tablets, of course, but isn’t limited to just Amazon brand stuff. There’s a massive selection of renewed and unlocked smartphones, PlayStation and Switch gear, countertop kitchen appliances, robot vacuums, and just about anything else you can think of. Amazon features a wider spectrum of brands and price points in its Renewed section than Best Buy does, so this might be your first stop if you’re shopping on a budget.

    What can you buy? A huge lineup of Amazon and Kindle products, as well as refurbished iPhones, Android phones, and gaming consoles.

    Buying refurbished from Apple

    Wondering how to buy refurbished iPhones? People are pretty concerned about what’ll happen to iPhone prices in the wake of tariffs, and understandably so. China has been saddled with a particularly stiff reciprocal tariff rate compared to other countries, and it’s estimated that 80 percent of iPhones are manufactured in China. Though Apple itself hasn’t given any official word, the effects of tariffs on iPhones seem imminent. (The story is probably similar for other Apple devices.)

    You could hang onto the delusion that a Made in America iPhone will exist anytime soon and cost a normal amount of money. You should heavily consider buying a refurbished iPhone. If you’d prefer to still buy your most precious device through the brand itself, Apple’s own Certified Refurbished market is probably the most exhaustive brand-specific refurbished marketplace on the internet.

    SEE ALSO:

    iPhone 16 vs. iPhone 15: How are they different?

    Buying your renewed Apple device ensures genuine Apple parts and fully-tested functionality up to Apple’s own standards. Delivery and returns are free, and trade-in credits are possible with an eligible device. Apple doesn’t really offer direct discounts on any of its products on its website, but it does claim that going the refurbished route saves up to 15% compared to buying new.

    What can you buy? There are tabs for iPhone, Mac, iPad, Watch, AirPods, Apple TV, HomePod, and accessories like the Apple Pencil.

    Buying refurbished from Nintendo

    The Nintendo Switch 2 is the console of the hour, and not just because a new Mario Kart is afoot. It was barely two days after the highly-awaited handheld was announced that a second announcement came: Nintendo had to pause Switch 2 pre-orders in the U.S. because of tariffs.

    For many impatient folks considering buying a Switch 2, it might be worthwhile to just buy a refurbished OG Switch from Nintendo instead. This won’t be helpful to anyone who already has a perfectly fine Switch at home, or anyone who specifically wants to play new games that’ll only work on the new Switch. But say you’re simply trying to replace the broken Switch you currently have — the Nintendo Store has several refurbished systems on hand for way less than the original asking price, including OLED models. Cosmetic defects are possible, but they’ve all been restored and verified to be fully functional.

    What can you buy? You won’t find the Switch 2, but you can buy the original console, the Switch OLED, extra controllers, and other accessories.

    Buying refurbished from Samsung

    Samsung doesn’t rely as heavily on China for the production of its smartphones as Apple does, so it’s not as affected by the aftershock of Trump’s reciprocal tariff feud with China. But Samsung’s biggest manufacturing countries (like Vietnam) are still being hit with substantial tariff rates, so it’s quite possible that Samsung products will get more expensive as a result.

    Luckily, Samsung has been perfecting its reuse and recycling game for years, at least when it comes to its Galaxy phones. Samsung Certified Re-Newed Smartphones have been crafted with new batteries and are eligible for trade-in credits up to $250 when you trade in an eligible smartphone. Renewed phones as new as the 2024 Galaxy S24 Ultra are available on Samsung’s website. For other Samsung products, like Galaxy Watches or Galaxy Tablets, Back Market and Best Buy have more options.

    What can you buy? Samsung’s flagship phones

    Buying refurbished from Dyson

    Vacuums, hair styling tools, fans — all items that you’d probably feel better about buying secondhand if you had the assurance that their filters and motors were professionally cleaned. The Dyson Renewed Outlet has a handful of refurbished options in each of those categories at any given time. All are already priced anywhere from $50 to $250 lower than the MSRP or even common sale price of the brand new versions, but Dyson often tacks extra discounts on as well. Bonus: Everything ships in brand-new recyclable packaging.

    What can you buy? The Dyson Renewed Outlet is the best place to get refurbished Dyson Supersonic hair dryers, vacuums, and air purifiers




  • 7 Best Mesh Routers (2025), Tested and Reviewed

    7 Best Mesh Routers (2025), Tested and Reviewed


    Mesh routers promise dependable Wi-Fi throughout your home, and most follow through, but finding the best mesh router for the job can be tricky. Instead of a single router to wash your home in Wi-Fi connectivity, a mesh system combines the main router with one or more nodes that appear as a unified Wi-Fi network. Your devices will automatically connect to the nearest option for the best speeds.

    Most of us are stuck with placing our router in a less-than-optimal spot, depending on where the internet connection comes into our home. You can extend Wi-Fi coverage by placing a second or third node where needed. Whether you want to fix dead zones, deliver a stronger signal into the back bedroom, or have great Wi-Fi in the backyard, a mesh system could be the answer. The Asus ZenWiFi XT8 is our top pick for most people, but I have many alternatives to suit different homes and internet connections.

    Before you dive into our lineup, it’s a good idea to consider whether a mesh system is right for you. Our guide on how to choose a router will help you answer that question and figure out what features you need. If you don’t want to switch to a new system, I also have advice on upgrading your existing Wi-Fi and, as always, ways to secure it and protect your home network.

    Updated April 2025: We’ve added some details to our top pick, changed our recommended Eero system, and added the Eero 7. We’ve also added the Asus ZenWifi BT8 mesh and an Avoid section with a few entries, including the Acer Predator Connect T7.

    Table of Contents

    Power up with unlimited access to WIRED. Get best-in-class reporting that’s too important to ignore for just $2.50 $1 per month for 1 year. Includes unlimited digital access and exclusive subscriber-only content. Subscribe Today.

    Things to Consider When Shopping for a Mesh System

    Here are a few points to keep in mind when you are buying a new mesh Wi-Fi system.

    Wi-Fi standards: Many devices support Wi-Fi 6E now. (Many of the best laptops and phones do, and it’s only growing more common.) Support for Wi-Fi 7 is also growing (the iPhone 16 range supports it). All the mesh routers I recommend as main picks support at least Wi-Fi 6, and they are backward compatible with older Wi-Fi standards. If you have a lot of new devices, consider Wi-Fi 6E or Wi-Fi 7. Our router shopping guide goes into more depth.

    Internet speeds: There are many ways to upgrade your Wi-Fi, but your internet speed is limited by your internet service provider (ISP). If the maximum speed of data coming to your modem is 100 Mbps, that’s the fastest possible connection that any router can provide.

    Bands: The top speed that router manufacturers claim on the box is all of the bands added together, which is disingenuous since you will only ever connect to one band at a time.

    Coverage: While it’s good to have an idea of a router’s coverage and speed, understand that your mileage may vary. The construction materials in your house, your neighbors’ proximity and Wi-Fi networks, the devices you have with wireless connectivity, and the position of routers and nodes in your home are just some of the factors that can impact the performance of your Wi-Fi.

    Backhaul: Backhaul channels are reserved for one mesh router or node to talk to another. It’s common for mesh routers to have a fast backhaul channel, enabling the main router to provide speeds as close to your full internet speed as possible to any node. This is also important for local network speed and may impact the performance of network-attached storage (NAS) systems, remote console play, and how quickly you can copy a file from one wireless device on your network to another.

    QoS: Quality of Service, allows you to prioritize specific activities and their related apps. You can use it to ensure gaming, streaming, or video calls take precedence, which can be very handy in any household with limited bandwidth.

    Ports: Ports and cables can help establish more stable connections. They may be essential if you have smart home hubs for lights and security cameras or network-attached storage that needs to plug into your main router. But they can also be useful on nodes to plug in streaming devices or game consoles and get the full benefit of any dedicated backhaul channel speeds your chosen system might offer.

    Mesh vs. router: Although mesh systems are tempting, many homes will be better served by a single, well-placed Wi-Fi router. Check out the Best Wi-Fi Routers for options. Some of the routers I tested in my two-floor 1,600-square-foot home performed just as well or better than mesh systems.

    Security: Most routers come with optional subscriptions for security, parental controls, and sometimes other extras like VPN service. You don’t need these subscriptions, but they can be handy and provide peace of mind. Just make sure you factor in the cost or opt for a system from a manufacturer like Asus, which offers them for free.

    Wait for sales: Mesh systems tend to be very expensive when first released and are often buggy. By waiting a few months, you can expect deep discounts (50 percent is not unusual) and firmware updates that ensure more stable performance. I am considering revising review scores based on initial pricing and performance for mesh systems that are now more affordable and stable, but I will always add a note to indicate when I have done this.

    To test these mesh systems, I use each one for at least a week (usually longer) in a busy family home of four with lots of video streaming, gaming, and video calls. I run speed tests (downloads and uploads). I transfer files on the network on multiple devices (including iPhones, Android phones, Windows PCs, and MacBooks) from different spots around my home, including files from devices connected to the main router to devices connected to nodes. I use NetSpot to survey signal strength throughout the house and create heat maps for comparison. I run the TamoSoft Throughput Test, and I turn the power and modem off and on to find out how each system recovers. I also test the mobile apps and web interfaces to see how easy it is to change settings, set up parental controls, and access security features.

    Best Mesh Router Overall

    The combination of speedy performance, impressive range, and lots of extra features earns the Asus ZenWiFi XT8 the top spot as the best mesh Wi-Fi system. (Even if it’s a bit of a mouthful.) I tested the two-pack, and the straightforward setup through the mobile app took minutes, though you have to keep the node close by during setup and then move it. This is a tri-band Wi-Fi 6 system with one 2.4-GHz band and two 5-GHz bands (one is reserved for wireless backhaul). Available in black or white, these units are fairly large, but they’re unobtrusive and look classy, with side vents to help dissipate heat. Each router offers three gigabit Ethernet ports, which is generous, as well as a 2.5 gigabit WAN port and a USB 3.1 port.

    At short, medium, or long range, the XT8 was consistently one of the fastest systems I tested, and speeds never dropped. The inclusion of AiProtection Pro, which adds anti-malware and parental controls powered by Trend Micro, is very welcome, especially since it doesn’t require a subscription, unlike most competitors. Just remember that using AiProtection means sharing your data with Trend Micro, so you might want to read its privacy policy. I like the parental controls, too. You can set up and reuse profiles, schedule bedtimes, filter by age group, and review activity. The Quality of Service (QoS) option lets you prioritize activities like working from home, gaming, or streaming, and you can limit bandwidth for specific devices.

    The mobile app has a wealth of options, and the web interface is even more in-depth. It’s easy to split bands or set up a guest network. I also found that the app recognized most devices correctly. (Sometimes it’s difficult to identify devices from the attributed hardware names in router apps.) There’s support for AiMesh, which means you can easily add other Asus routers to expand your Wi-Fi system. The dedicated backhaul channel—the way the router speaks to its nodes and vice versa—is extremely fast, ensuring you get the full speed of your internet connection even from that node you placed near the backyard.

    The major caveat with this mesh is that it can take some tinkering to get it working well for your home. If a failed firmware update is your idea of hell or you can’t face trial and error with settings, pick one of the systems below. My XT8 node initially refused to update its firmware, which took a couple of attempts to fix. I also had an issue with my Sonos speakers disappearing, which required a factory reset. Overall, using the XT8 has been a smooth experience. With a little patience and research, it’s easy for just about anyone to operate, but the depth of options will satisfy power users. You can find open source firmware if you want to go down the rabbit hole.

    I also tested the slightly upgraded version of this mesh, the Asus ZenWiFi XT9 ($285). It appears identical but offers a few upgrades beneath the hood. Firstly, the 5-GHz band you can connect to has a 160-MHz channel width (theoretically double the XT8’s bandwidth), the processor is slightly more powerful, and there’s support for link aggregation. On the downside, just like with the XT8, I had some teething troubles with the XT9 that required a firmware upgrade and some tweaks to the settings. It’s slightly better than the XT8, so if you see it at a similar price, I would go for the XT9 instead.


    Best Budget Mesh Router

    Note: The US government is reportedly mulling a TP-Link router ban after reports that vulnerabilities in the Chinese firm’s routers were exploited in high-profile attacks linked to the Chinese government. According to The Wall Street Journal, the US Commerce, Defense, and Justice departments are investigating TP-Link, though no evidence of any deliberate wrongdoing has yet emerged. TP-Link president Jeff Barney told WIRED the company is cooperating with the investigation, has a transparent supply chain with manufacturing in Vietnam, not China, and is now headquartered in California, having split from TP-Link Technologies, which focuses on mainland China. TP-Link is not the only brand targeted by malicious actors; Cisco and Netgear devices have also been infected in suspected Chinese state-sponsored attacks. I’ll monitor this situation as it develops before deciding whether I need to reconsider recommendations.

    The Deco X20 is an affordable Wi-Fi 6 mesh that delivers decent coverage and performance, with optional parental controls and antivirus protection, making it ideal for an average family home. I tested the three-pack, and it was very easy to set ’em all up. The three routers are small and sport a cylinder design that blends in well. This is a dual-band system (2.4 GHz and 5 GHz). There are two gigabit Ethernet ports on each router.

    Coverage and speeds are OK, falling well short of the Asus XT8 but beating systems like the entry-level Eero 6. The app is straightforward, and it’s easy to set up a guest network. Originally released with the free HomeCare software, this has since changed to a HomeShield system, and TP-Link has updated its HomeShield and parental control subscriptions. You get basic network security (router scan, guest network, QoS) and parental controls (create profiles, pause internet, block, and filter) included for free, but everything else requires a subscription.

    HomeShield Security+ costs $5 a month or $36 a year and adds web and intrusion protection with notifications and reports. Total Security costs $70 a year and adds antivirus for devices, VPN service, and a password manager. Advanced Parental Controls costs $3 a month or $18 a year and adds time limits, downtime scheduling, rewards, app time limits, safe search, insights, and reports. While this granularity enables you to pick and choose what you need, it might be confusing for some, and I’m not keen on subscription creep. That said, most families will likely want the Security+ and Advanced Parental Controls, which will come in at $54 for the year ($1 cheaper than the HomeShield Pro it replaces).

    The Quality of Service feature lets you prioritize activities like gaming or streaming, or set priority devices. Importantly, you can split the 2.4-GHz and 5-GHz bands to show as two separate Wi-Fi networks. This is handy, as some smart home devices only operate on the former band. Similarly, there’s a mixed mode for WPA2 and WPA3 security. Some devices don’t work with the newer WPA3 standard, and some routers force you to choose one or the other, which can lead to issues. This mode ensures all your gadgets are on a compatible standard.

    The web interface is basic and doesn’t add much, so I preferred using the easy-to-use app. However, it’s a little slow to update, and settings are limited. It didn’t recognize many devices and listed obscure hardware manufacturer names, making it tough to know which devices to add to my kid’s profiles.

    It wasn’t the speediest performer, but this system is fast and dependable enough for the average home. If you have a connection that’s 500 Mbps or better, it might be worth upgrading to the Deco X55 or Deco X60.


    Best for Simplicity

    Amazon’s Eero mesh systems are some of the easiest to set up, offer fairly wide coverage, and deliver stable connectivity. The Eero Pro 6E (7/10, WIRED Recommends) is an elegant system, available as two or three identical routers. The Eeros blend in easily on a table or shelf, sport a USB-C port for power, and two Ethernet ports rated at 2.5 Gbps and 1 Gbps. This tri-band system supports Wi-Fi 6E, offering the 6-GHz band alongside 2.4- and 5-GHz, and is designed to be a hands-off, set-and-forget mesh system.

    The Eero Pro 6E was impressively fast in my tests; there were no drops, and it proved adept at sharing bandwidth. The mobile app is straightforward, giving you an overview of connected devices with the option to pause the internet and set up a guest network. I could also create profiles, group devices, set schedules, and fix bedtimes. Unfortunately, content filtering, other parental controls, advanced security, ad blocking, and activity insights require an Eero Plus subscription at $10 per month or $100 per year.

    Eero is an Amazon company, and its routers come with Alexa support. Enable the Eero skill, and you can pause the internet with a voice command through your Echo device, which is handy when your child won’t get off the computer to eat dinner. The Eero Pro 6E supports Matter and Thread and can pull double duty as a ZigBee smart-home hub in the same way Echo devices can, allowing you to directly connect some smart lighting, smart locks, and other ZigBee devices.

    Two other tricks make Eero systems attractive. An Echo (4th Gen), Echo Dot (4th or 5th Gen), or Echo Dot with clock (4th or 5th Gen) smart speaker can act as a Wi-Fi extender, offering an extra 1,000 square feet of coverage at speeds up to 100 Mbps for up to 10 devices. Eero also offers an Internet Backup option, so you can add multiple backup networks (Wi-Fi or hotspot) to keep you online if your main wired network goes down.

    Eero’s simplicity will appeal to anyone who hates digging into settings, but there’s a cost. You won’t find any Quality of Service features for prioritizing activities, and you can’t separate bands. One final con with basic Eero systems is comparatively slow transfer speeds, though this was not an issue for the Pro 6E and other higher-end systems I tested.

    A few Eero systems on the market are worth considering, offering a broadly similar experience. The first two are dual-band systems (2.4 GHz and 5 GHz). Although the basic Eero 6 ($200) was one of the slower systems I tested, particularly at longer distances, it’s likely enough for folks with internet connections up to 500 Mbps and modest needs. If you have a faster connection, up to 1 Gbps, and your home is smaller than 4,500 square feet, then the Eero 6+ ($300) might suit.

    If you want a Wi-Fi 7 system and have a small home or limited demand, consider the Eero 7 ($350). It’s another dual-band system, so you don’t get the faster 6-GHz band, but you get the other advantages of Wi-Fi 7, including MLO and enhanced security. The Eero 7 performed respectably in my tests, with solid 2.4- and 5-GHz band speeds, but range and throughput are limited, meaning it won’t be a good pick for everyone. It has a 2.5 Gbps port, but I’d pick something else if your connection is faster than 1 Gbps. The Eero 7 only did slightly better than the 6+ and was significantly outperformed by the Pro 6E. Considering that a three-pack of the Pro 6E frequently drops to $400, it’s a better buy.

    Anyone with larger properties or above-average demands (lots of devices and people simultaneously using the internet) might consider the Eero Pro 7 ($700)—I’ll be testing it next. Or the top-of-the-line Eero Max 7 ($1,360) (7/10, WIRED Review), which boasts four Ethernet ports, two rated at 10 Gbps and two at 2.5 Gbps, though it will be overkill for most people. If you want a stronger signal in your backyard this summer, you can also snag an Eero 7 Outdoor ($400) to pair with any of these systems, though I have not tested it yet.

    All Eero systems are compatible with each other, which makes it easy to expand your network. You can dig deeper into the differences in our Eero buying guide. But whichever model you choose, keep an eye out for frequent discounts.


  • Andor season 2 brings Star Wars back in a big way

    Andor season 2 brings Star Wars back in a big way


    Hi, friends! Welcome to Installer No. 80, your guide to the best and Verge-iest stuff in the world. (If you’re new here, welcome, hope you had better luck than I did preordering a Switch 2, and also you can read all the old editions at the Installer homepage.)

    This week, I’ve been reading about The Telepathy Tapes and extremely online parenting and translation glasses, watching The Men Who Built America, cackling at this incredible star-studded live reading of the original Star Wars, playing the whole archive of 4×3, doing some writing in the new Easlo Journal app, testing some headphones I impulse-bought on the TikTok Shop, and seeing if the Kagi Assistant fits into my search-engine world.

    Oh, also: Thanks to everyone who sent me notes with thoughts about wallpapers! You’ve given me a bunch of fun ideas about how to expand the Screen Share section, including showing off more of your setups. More on that to come really soon.

    I also have for you a terrific new entry in the Star Wars universe, a flip phone worth a look, new apps from Instagram and Perplexity, two games you’ll love, and much more. Pricey week, this one… sorry in advance. Let’s dig in.

    (As always, the best part of Installer is your ideas and tips. What are you playing / reading / watching / scrolling / buying / building this week? What should everyone else be into, too? Tell me everything: installer@theverge.com. And if you know someone else who might enjoy Installer, tell them to subscribe here.)

    • Andor season 2. The best Star Wars thing going right now, and it’s not especially close. I wondered if season two could continue the unusual, almost off-brand take on this universe, but by all accounts the show completely stuck the landing.
    • The Motorola Razr Ultra. Motorola is, like, this close to getting the 2025 flip phone exactly right. The new model seems to be a little sturdier, a little faster, and a little less of a compromise just to get the flip. That’s the goal! I just wish it didn’t cost $1,299, and I wish I knew when it was shipping.
    • Parker’s Obsessed with this Movie (But She Cannot Find it Anywhere). A delightful, and extremely relatable, podcast low-stakes mystery: this movie has an IMDb page, but doesn’t seem to exist anywhere at all. A fun dive into where things go when they go away.
    • Instagram Edits. I mean, you get it, it’s CapCut but for Instagram. But this is a good idea! It’s weird, frankly, that there aren’t more top-notch apps for editing social video. There’s some interesting AI at work in this one, too. Say this for Meta: it copies well.
    • Perplexity iOS Voice Assistant. One of the more ambitious mobile assistants I’ve seen. Perplexity actually connected its assistant to Reminders, Calendar, and other system features — which I don’t think I knew was possible — and seems to just blow Siri out of the water.
    • Clair Obscur: Expedition 33. Very few games are able to simultaneously feel like a movie and a video game. Clair Obscur does, in part because it’s voiced by a bunch of movie stars! The premise here is great, the story is huge, and frankly I’ll watch Andy Serkis in anything.
    • The WaterField Designs Tech Folio Tank Backpack. I have always been a sucker for a great bag. I’ve curbed my habit a little now that I work from home, but this one? This $419 backpack fits even humongous laptops, has pockets for everything you could imagine, and is only slightly enormous. I want one.
    • The Insta360 X5. I’m convinced that if Insta360 had a better company name, it would be as recognizable as GoPro. Its products are great! This one’s expensive — $550 — but it’s every bit a flagship action camera, and the replaceable lenses are really clever.
    • The Elder Scrolls IV: Oblivion Remastered. There is nothing cooler than just dropping a game out of nowhere on an unsuspecting public that is obviously going to love it. That’s what Bethesda did with this giant update to a 20-year-old game — we’ve had inklings for a while that this was coming eventually, but lots of fans were still pleasantly surprised this week.

    I first got to know Jeff Sheldon, the proprietor of Ugmonk, a couple of years ago when I wrote a story about his Gather collection of desk gear. But I first became a fan of his work when I discovered his Analog productivity system, a cleverly designed way to get things done with pen and paper. (I know a lot of you like Analog stuff, too, so PSA: there’s a new “Steel” version of the system that is extremely nice-looking.)

    Jeff is one of those people who likes everything to be just so, which I very much appreciate about him. I asked him to share his homescreen with us, wondering if it would be the same thing. I was not disappointed. Here’s Jeff’s homescreen, plus some info on the apps he uses and why:

    A lockscreen and homescreen from an iPhone

    Screenshot

    The phone: iPhone 16 Pro.

    The wallpaper: Solid black. I never understood how people can see their apps with a busy photo behind them. 🤷‍♂️My lockscreen is a photo I took in Copenhagen.

    The apps: Photos, Fantastical, Ugmonk, Google Maps, Weather, Apple Podcasts, MyMind, Dropbox Paper, X, Instagram, Threads, Apple Notes, Camera, Spotify, Phone, Shopify, Mail, Messages, Slack, Safari.

    I use the Due app widget to capture to-do’s when I’m on the go and then I transfer these onto an Analog Card once I’m at my desk so they actually get done. Fantastical’s natural language input is so much nicer than iCal’s. “Call with David Pierce tomorrow 10AM.”

    I save everything to MyMind. It’s like a private Pinterest board that’s way easier to search and doesn’t have ads. I‘ve been using Dropbox Paper for many years, and use it for everything. It’s basically a much cleaner version of Google Docs with built-in markdown and smart links. Unfortunately the iPhone app is pretty janky, so I mostly use it for viewing docs and do actual input on desktop. Apple Notes is for anything and everything.

    I also asked Jeff to share a few things he’s into right now. Here’s what he sent back:

    • The Orchid from Telepathic Instruments. I don’t even play music, but I want this thing. The video is so good.
    • This case study of the Herman Miller rebrand. So much design gold in here.
    • SABLE, fABLE, Bon Iver’s newest album. I’ve had this on repeat for days. One of my favorite artists. Also, here’s a great interview with Justin Vernon.
    • Limba Trip. This guy’s spin art is so trippy.

    Here’s what the Installer community is into this week. I want to know what you’re into right now as well! Email installer@theverge.com or message me on Signal — @davidpierce.11 — with your recommendations for anything and everything, and we’ll feature some of our favorites here every week. For more great recommendations, check out the replies to this post on Threads and this post on Bluesky.

    “I have loved, and struggled with my Apple MagSafe wallet for a long time. I’m always afraid it’s going to fall off. So a while ago I found this case that basically solves all the MagSafe issues. It’s called OpenCase, and they basically cut a hole in the case the exact size of an Apple wallet, which creates a lip that the wallet would run into if it tried to slide off. Now it can’t fall off unless I remove it intentionally.” — Mike

    “Found an awesome game off of a Hacker News comment: A Short Hike. Beautiful little short experience.” — Fil

    “In keeping with my desire to ‘buck the algorithms’ in a day and age where there are too many simultaneous algorithms telling you what to do, I’ve been referred to a free newsletter that just recommends one movie, every Tuesday. It’s called Tuesday Night Movie Night.” — Phillip

    “Trying to clear out my Blank Check podcast backlog so I’ve seen about eight thousand Steven Spielberg movies in the last few days. This guy might be going places.” — Luis

    “A fun driving game: It’s called Slow Roads, and it’s a zen driving experience. It’s relaxing and you can change the environment, it has no traffic. I would definitely recommend it to anyone who likes driving.” — Srirudran

    “I’ve been testing this weather app for iOS called Lume that uses GPT. Loving the UI so far! Just wish it had a widget.” — Daniel

    Aerospace is a full window-tiling system for MacOS that makes keyboard navigation of a ton of windows super easy, once you learn the mental model of tiled window management.” — James

    “I just got around to reading this essay in Hearing Things. Made me think about so many things, but especially how music has shaped so much of my worldview, and the strong memories I have of listening to and playing music with friends and family. Nothing better.” — Rhoades

    “I’ve been enjoying Everybody’s Live with John Mulaney for the past few weeks, but last night’s episode was surely one of the best. There’s a few more weeks. It’s a fun take on the traditional talk show format, which is much needed in the US, and it’s live with no delay.” — Bob

    The traveling salesman problem is one of those things that smart people in tech just kind of throw around all the time, as sort of a shorthand for problems that seem straightforward but turn out to be massively difficult even for powerful computers. The simplest version of the TSP is just this: if I give you a list of cities, and the distances between each of them, what’s the shortest possible route that gets to them all once and then back to where you started? There are actually lots of solutions to lots of versions of this problem, but it’s still part of how algorithms are thought of and tested.

    Anyway, I spent a lot of time this week reading about Korea81998, a project that managed to solve the traveling salesman problem for all 81,998 bars in South Korea. The project’s website starts with a simple explanation of the problem and then goes deep into the math and computation required to make it work. This particular bar crawl would take you just a smidge under six months to complete, and trust me: there’s no way to do it even one second faster.

    Oh, and if you want to go even deeper on this, someone on Hacker News linked to this great hourlong talk from one of the researchers all about solving TSPs. It’s not light weekend viewing, but it’s awesome.




  • The TechCrunch Cyber Glossary | TechCrunch

    The TechCrunch Cyber Glossary | TechCrunch


    The cybersecurity world is full of jargon and lingo. At TechCrunch, we have been writing about cybersecurity for years, and we frequently use technical terms and expressions to describe the nature of what is happening in the world. That’s why we have created this glossary, which includes some of the most common — and not so common — words and expressions that we use in our articles, and explanations of how, and why, we use them. 

    This is a developing compendium, and we will update it regularly. If you have any feedback or suggestions for this glossary, get in touch.


    An advanced persistent threat (APT) is often categorized as a hacker, or group of hackers, which gains and maintains unauthorized access to a targeted system. The main aim of an APT intruder is to remain undetected for long periods of time, often to conduct espionage and surveillance, to steal data, or sabotage critical systems.

    APTs are traditionally well-resourced hackers, including the funding to pay for their malicious campaigns, and access to hacking tools typically reserved by governments. As such, many of the long-running APT groups are associated with nation states, like China, Iran, North Korea, and Russia. In recent years, we’ve seen examples of non-nation state cybercriminal groups that are financially motivated (such as theft and money laundering) carrying out cyberattacks similar in terms of persistence and capabilities as some traditional government-backed APT groups.

    (See: Hacker)

    An adversary-in-the-middle (AitM) attack, traditionally known as a “man-in-the-middle” (MitM), is where someone intercepts network traffic at a particular point on the network in an attempt to eavesdrop or modify the data as it travels the internet. This is why encrypting data makes it more difficult for malicious actors to read or understand a person’s network traffic, which could contain personal information or secrets, like passwords. Adversary-in-the-middle attacks can be used legitimately by security researchers to help understand what data goes in and out of an app or web service, a process that can help identify security bugs and data exposures.

    The ability to run commands or malicious code on an affected system, often because of a security vulnerability in the system’s software. Arbitrary code execution can be achieved either remotely or with physical access to an affected system (such as someone’s device). In the cases where arbitrary code execution can be achieved over the internet, security researchers typically call this remote code execution. 

    Often, code execution is used as a way to plant a back door for maintaining long-term and persistent access to that system, or for running malware that can be used to access deeper parts of the system or other devices on the same network. 

    (See also: Remote code execution)

    Attribution is the process of finding out and identifying who is behind a cyberattack. There is an often repeated mantra, “attribution is hard,” which is to warn cybersecurity professionals and the wider public that definitively establishing who was behind a cyberattack is no simple task. While it is not impossible to attribute, the answer is also dependent on the level of confidence in the assessment.

    Threat intelligence companies such as CrowdStrike, Kaspersky, and Mandiant, among others, have for years attributed cyberattacks and data breaches to groups or “clusters” of hackers, often referencing groups by a specific codename, based on a pattern of certain tactics, techniques and procedures as seen in previous attacks. Some threat intelligence firms go as far as publicly linking certain groups of hackers to specific governments or their intelligence agencies when the evidence points to it. 

    Government agencies, however, have for years publicly accused other governments and countries of being behind cyberattacks, and have gone as far as identifying — and sometimes criminally charging — specific people working for those agencies.

    A backdoor is a subjective term, but broadly refers to creating the means to gain future access to a system, device, or physical area. Backdoors can be found in software or hardware, such as a mechanism to gain access to a system (or space) in case of accidental lock-out, or for remotely providing technical support over the internet. Backdoors can have legitimate and helpful use cases, but backdoors can also be undocumented, maliciously planted, or otherwise unknown to the user or owner, which can weaken the security of the product and make it more susceptible to hacking or compromise.

    TechCrunch has a deeper dive on encryption backdoors.

    Hackers historically have been categorized as either “black hat” or “white hat,” usually depending on the motivations of the hacking activity carried out. A “black hat” hacker may be someone who might break the law and hack for money or personal gain, such as a cybercriminal. “White hat” hackers generally hack within legal bounds, like as part of a penetration test sanctioned by the target company, or to collect bug bounties finding flaws in various software and disclosing them to the affected vendor. For those who hack with less clearcut motivations, they may be regarded as a “gray hat.” Famously, the hacking group the L0pht used the term gray hat in an interview with The New York Times Magazine in 1999. While still commonly used in modern security parlance, many have moved away from the “hat” terminology. 

    (Also see: Hacker, Hacktivist)

    Botnets are networks of hijacked internet-connected devices, such as webcams and home routers, that have been compromised by malware (or sometimes weak or default passwords) for the purposes of being used in cyberattacks. Botnets can be made up of hundreds or thousands of devices and are typically controlled by a command-and-control server that sends out commands to ensnared devices. Botnets can be used for a range of malicious reasons, like using the distributed network of devices to mask and shield the internet traffic of cybercriminals, deliver malware, or harness their collective bandwidth to maliciously crash websites and online services with huge amounts of junk internet traffic. 

    (See also: Command-and-control server; Distributed denial-of-service)

    A brute-force attack is a common and rudimentary method of hacking into accounts or systems by automatically trying different combinations and permutations of letters and words to guess passwords. A less sophisticated brute-force attack is one that uses a “dictionary,” meaning a list of known and common passwords, for example. A well designed system should prevent these types of attacks by limiting the number of login attempts inside a specific timeframe, a solution called rate-limiting. 

    A bug is essentially the cause of a software glitch, such as an error or a problem that causes the software to crash or behave in an unexpected way. In some cases, a bug can also be a security vulnerability. 

    The term “bug” originated in 1947, at a time when early computers were the size of rooms and made up of heavy mechanical and moving equipment. The first known incident of a bug found in a computer was when a moth disrupted the electronics of one of these room-sized computers.

    (See also: Vulnerability)

    Command-and-control servers (also known as C2 servers) are used by cybercriminals to remotely manage and control their fleets of compromised devices and launch cyberattacks, such as delivering malware over the internet and launching distributed denial-of-service attacks.

    (See also: Botnet; Distributed denial-of-service)

    This is a word that can have two meanings depending on the context. Traditionally, in the context of computer science and cybersecurity, crypto is short for “cryptography,” the mathematical field of coding and decoding messages and data using encryption.

    Crypto has more recently also become short for cryptocurrency, such as Bitcoin, Ethereum, and the myriad blockchain-based decentralized digital currencies that have sprung up in the last fifteen years. As cryptocurrencies have grown from a niche community to a whole industry, crypto is now also used to refer to that whole industry and community. 

    For years, the cryptography and cybersecurity community have wrestled with the adoption of this new meaning, going as far as making the phrases “crypto is not cryptocurrency” and “crypto means cryptography” into something that features on its own dedicated website and even T-shirts. 

    Languages change over time depending on how people use words. As such, TechCrunch accepts the reality where crypto has different meanings depending on context, and where the context isn’t clear, then we spell out cryptography, or cryptocurrency. 

    Cryptojacking is when a device’s computational power is used, with or without the owner’s permission, to generate cryptocurrency. Developers sometimes bundle code in apps and on websites, which then uses the device’s processors to complete complex mathematical calculations needed to create new cryptocurrency. The generated cryptocurrency is then deposited in virtual wallets owned by the developer. 

    Some malicious hackers use malware to deliberately compromise large numbers of unwitting computers to generate cryptocurrency on a large and distributed scale.

    The world wide web is the public content that flows across the pipes of the internet, much of what is online today is for anyone to access at any time. The “deep web,” however, is the content that is kept behind paywalls and member-only spaces, or any part of the web that is not readily accessible or browsable with a search engine. Then there is the “dark web,” which is the part of the internet that allows users to remain anonymous but requires certain software (such as the Tor Browser) to access, depending on the part of the dark web you’re trying to access.

    Anonymity benefits those who live and work in highly censored or surveilled countries, but it also can benefit criminals. There is nothing inherently criminal or nefarious about accessing the dark web; many popular websites also offer dark web versions so that users around the world can access their content. TechCrunch has a more detailed explainer on what the dark web is.

    When we talk about data breaches, we ultimately mean the improper removal of data from where it should have been. But the circumstances matter and can alter the terminology we use to describe a particular incident. 

    A data breach is when protected data was confirmed to have improperly left a system from where it was originally stored and usually confirmed when someone discovers the compromised data. More often than not, we’re referring to the exfiltration of data by a malicious cyberattacker or otherwise detected as a result of an inadvertent exposure. Depending on what is known about the incident, we may describe it in more specific terms where details are known.

    (See also: Data exposure; Data leak)

    A data exposure (a type of data breach) is when protected data is stored on a system that has no access controls, such as because of human error or a misconfiguration. This might include cases where a system or database is connected to the internet but without a password. Just because data was exposed doesn’t mean the data was actively discovered, but nevertheless could still be considered a data breach. 

    A data leak (a type of data breach) is where protected data is stored on a system in a way that it was allowed to escape, such as due to a previously unknown vulnerability in the system or by way of insider access (such as an employee). A data leak can mean that data could have been exfiltrated or otherwise collected, but there may not always be the technical means, such as logs, to know for sure.

    Deepfakes are AI-generated videos, audios, or pictures designed to look real, often with the goal of fooling people into thinking they are genuine. Deepfakes are developed with a specific type of machine learning known as deep learning, hence its name. Examples of deepfakes can range from relatively harmless, like a video of a celebrity saying something funny or outrageous, to more harmful efforts. In recent years, there have been documented cases of deepfaked political content designed to discredit politicians and influence voters, while other malicious deepfakes have relied on using recordings of executives designed to trick company employees into giving up sensitive information or sending money to scammers. Deepfakes are also contributing to the proliferation of nonconsensual sexual images.  

    Def Con is one of the most important hacking conferences in the world, held annually in Las Vegas, usually during August. Launched in 1993 as a party for some hacker friends, it has now become an annual gathering of almost 30,000 hackers and cybersecurity professionals, with dozens of talks, capture-the-flag hacking competitions, and themed “villages,” where attendees can learn how to hack internet-connected devices, voting systems, and even aircraft. Unlike other conferences like RSA or Black Hat, Def Con is decidedly not a business conference, and the focus is much more on hacker culture. There is a vendor area, but it usually includes nonprofits like the Electronic Frontier Foundation, The Calyx Institute, and the Tor Project, as well as relatively small cybersecurity companies.

    A distributed denial-of-service, or DDoS, is a kind of cyberattack that involves flooding targets on the internet with junk web traffic in order to overload and crash the servers and cause the service, such as a website, online store, or gaming platform to go down. 

    DDoS attacks are launched by botnets, which are made up of networks of hacked internet-connected devices (such as home routers and webcams) that can be remotely controlled by a malicious operator, usually from a command-and-control server. Botnets can be made up of hundreds or thousands of hijacked devices.

    While a DDoS is a form of cyberattack, these data-flooding attacks are not “hacks” in themselves, as they don’t involve the breach and exfiltration of data from their targets, but instead cause a “denial of service” event to the affected service.

    (See also: Botnet; Command-and-control server)

    Encryption is the way and means in which information, such as files, documents, and private messages, are scrambled to make the data unreadable to anyone other than to its intended owner or recipient. Encrypted data is typically scrambled using an encryption algorithm — essentially a set of mathematical formulas that determines how the data should be encrypted — along with a private key, such as a password, which can be used to unscramble (or “decrypt”) the protected data.

    Nearly all modern encryption algorithms in use today are open source, allowing anyone (including security professionals and cryptographers) to review and check the algorithm to make sure it’s free of faults or flaws. Some encryption algorithms are stronger than others, meaning data protected by some weaker algorithms can be decrypted by harnessing large amounts of computational power.

    Encryption is different from encoding, which simply converts data into a different and standardized format, usually for the benefit of allowing computers to read the data.

    (See also: End-to-end encryption)

    End-to-end encryption (or E2EE) is a security feature built into many messaging and file-sharing apps, and is widely considered one of the strongest ways of securing digital communications as they traverse the internet.

    E2EE scrambles the file or message on the sender’s device before it’s sent in a way that allows only the intended recipient to decrypt its contents, making it near-impossible for anyone — including a malicious hacker, or even the app maker — to snoop inside on someone’s private communications. In recent years, E2EE has become the default security standard for many messaging apps, including Apple’s iMessage, Facebook Messenger, Signal, and WhatsApp. 

    E2EE has also become the subject of governmental frustration in recent years, as encryption makes it impossible for tech companies or app providers to give over information that they themselves do not have access to.

    (See also: Encryption)

    Most modern systems are protected with multiple layers of security, including the ability to set user accounts with more restricted access to the underlying system’s configurations and settings. This prevents these users — or anyone with improper access to one of these user accounts — from tampering with the core underlying system. However, an “escalation of privileges” event can involve exploiting a bug or tricking the system into granting the user more access rights than they should have. 

    Malware can also take advantage of bugs or flaws caused by escalation of privileges by gaining deeper access to a device or a connected network, potentially allowing the malware to spread.

    When we talk about espionage, we’re generally referring to threat groups or hacking campaigns that are dedicated to spying, and are typically characterized by their stealth. Espionage-related hacks are usually aimed at gaining and maintaining stealthy persistent access to a target’s network to carry out passive surveillance, reconnaissance for future cyberattacks, or the long-term collection and exfiltration of data. Espionage operations are often carried out by governments and intelligence agencies, though not exclusively.

    An exploit is the way and means in which a vulnerability is abused or taken advantage of, usually in order to break into a system. 

    (See also: Bug; Vulnerability)

    In general terms, extortion is the act of obtaining something, usually money, through the use of force and intimidation. Cyber extortion is no different, as it typically refers to a category of cybercrime whereby attackers demand payment from victims by threatening to damage, disrupt, or expose their sensitive information. 

    Extortion is often used in ransomware attacks, where hackers typically exfiltrate company data before demanding a ransom payment from the hacked victim. But extortion has quickly become its own category of cybercrime, with many, often younger, financially motivated hackers, opting to carry out extortion-only attacks, which snub the use of encryption in favor of simple data theft.

    (Also see: Ransomware) 

    Forensic investigations involve analyzing data and information contained in a computer, server, or mobile device, looking for evidence of a hack, crime, or some sort of malfeasance. Sometimes, in order to access the data, corporate or law enforcement investigators rely on specialized devices and tools, like those made by Cellebrite and Grayshift, which are designed to unlock and break the security of computers and cellphones to access the data within.

    There is no one single definition of “hacker.” The term has its own rich history, culture, and meaning within the security community. Some incorrectly conflate hackers, or hacking, with wrongdoing. 

    By our definition and use, we broadly refer to a “hacker” as someone who is a “breaker of things,” usually by altering how something works to make it perform differently in order to meet their objectives. In practice, that can be something as simple as repairing a machine with non-official parts to make it function differently as intended, or work even better. 

    In the cybersecurity sense, a hacker is typically someone who breaks a system or breaks the security of a system. That could be anything from an internet-connected computer system to a simple door lock. But the person’s intentions and motivations (if known) matter in our reporting, and guides how we accurately describe the person, or their activity. 

    There are ethical and legal differences between a hacker who works as a security researcher, who is professionally tasked with breaking into a company’s systems with their permission to identify security weaknesses that can be fixed before a malicious individual has a chance to exploit them; and a malicious hacker who gains unauthorized access to a system and steals data without obtaining anyone’s permission.

    Because the term “hacker” is inherently neutral, we generally apply descriptors in our reporting to provide context about who we’re talking about. If we know that an individual works for a government and is contracted to maliciously steal data from a rival government, we’re likely to describe them as a nation-state or government hacker (or, if appropriate, an advanced persistent threat), for example. If a gang is known to use malware to steal funds from individuals’ bank accounts, we may describe them as financially motivated hackers, or if there is evidence of criminality or illegality (such as an indictment), we may describe them simply as cybercriminals.

    And, if we don’t know motivations or intentions, or a person describes themselves as such, we may simply refer to a subject neutrally as a “hacker,” where appropriate.

    (Also see: Advanced persistent threat; Hacktivist; Unauthorized)

    Sometimes, hacking and stealing data is only the first step. In some cases, hackers then leak the stolen data to journalists, or directly post the data online for anyone to see. The goal can be either to embarrass the hacking victim, or to expose alleged malfeasance. 

    The origins of modern hack-and-leak operations date back to the early- and mid-2000s, when groups like el8, pHC (“Phrack High Council”) and zf0 were targeting people in the cybersecurity industry who, according to these groups, had foregone the hacker ethos and had sold out. Later, there are the examples of hackers associated with Anonymous and leaking data from U.S. government contractor HBGary, and North Korean hackers leaking emails stolen from Sony as retribution for the Hollywood comedy, The Interview

    Some of the most recent and famous examples are the hack against the now-defunct government spyware pioneer Hacking Team in 2015, and the infamous Russian government-led hack-and-leak of Democratic National Committee emails ahead of the 2016 U.S. presidential elections. Iranian government hackers tried to emulate the 2016 playbook during the 2024 elections. 

    A particular kind of hacker who hacks for what they — and perhaps the public — perceive as a good cause, hence the portmanteau of the words “hacker” and “activist.” Hacktivism has been around for more than two decades, starting perhaps with groups like the Cult of the Dead Cow in the late 1990s. Since then, there have been several high profile examples of hacktivist hackers and groups, such as Anonymous, LulzSec, and Phineas Fisher. 

    (Also see: Hacker)

    Short for “information security,” an alternative term used to describe defensive cybersecurity focused on the protection of data and information. “Infosec” may be the preferred term for industry veterans, while the term “cybersecurity” has become widely accepted. In modern times, the two terms have become largely interchangeable. 

    Infostealers are malware capable of stealing information from a person’s computer or device. Infostealers are often bundled in pirated software, like Redline, which when installed will primarily seek out passwords and other credentials stored in the person’s browser or password manager, then surreptitiously upload the victim’s passwords to the attacker’s systems. This lets the attacker sign in using those stolen passwords. Some infostealers are also capable of stealing session tokens from a user’s browser, which allow the attacker to sign in to a person’s online account as if they were that user but without needing their password or multi-factor authentication code.

    (See also: Malware)

    Jailbreaking is used in several contexts to mean the use of exploits and other hacking techniques to circumvent the security of a device, or removing the restrictions a manufacturer puts on hardware or software. In the context of iPhones, for example, a jailbreak is a technique to remove Apple’s restrictions on installing apps outside of its “walled garden” or to gain the ability to conduct security research on Apple devices, which is normally highly restricted. In the context of AI, jailbreaking means figuring out a way to get a chatbot to give out information that it’s not supposed to. 

    The kernel, as its name suggests, is the core part of an operating system that connects and controls virtually all hardware and software. As such, the kernel has the highest level of privileges, meaning it has access to virtually any data on the device. That’s why, for example, apps such as antivirus and anti-cheat software run at the kernel level, as they require broad access to the device. Having kernel access allows these apps to monitor for malicious code.

    Malware is a broad umbrella term that describes malicious software. Malware can land in many forms and be used to exploit systems in different ways. As such, malware that is used for specific purposes can often be referred to as its own subcategory. For example, the type of malware used for conducting surveillance on people’s devices is also called “spyware,” while malware that encrypts files and demands money from its victims is called “ransomware.”

    (See also: Infostealers; Ransomware; Spyware)

    Metadata is information about something digital, rather than its contents. That can include details about the size of a file or document, who created it, and when, or in the case of digital photos, where the image was taken and information about the device that took the photo. Metadata may not identify the contents of a file, but it can be useful in determining where a document came from or who authored it. Metadata can also refer to information about an exchange, such as who made a call or sent a text message, but not the contents of the call or the message.

    Multi-factor authentication (MFA) is the common umbrella term for describing when a person must provide a second piece of information, aside from a username and password, to log into a system. MFA (or two-factor; also known as 2FA) can prevent malicious hackers from re-using a person’s stolen credentials by requiring a time-sensitive code sent to or generated from a registered device owned by the account holder, or the use of a physical token or key. 

    Operational security, or OPSEC for short, is the practice of keeping information secret in various situations. Practicing OPSEC means thinking about what information you are trying to protect, from whom, and how you’re going to protect it. OPSEC is less about what tools you are using, and more about how you are using them and for what purpose. 

    For example, government officials discussing plans to bomb foreign countries on Signal are practicing bad OPSEC because the app is not designed for that use-case, and runs on devices that are more vulnerable to hackers than highly restricted systems specifically designed for military communications. On the other hand, journalists using Signal to talk to sensitive sources is generally good OPSEC because it makes it harder for those communications to be intercepted by eavesdroppers.

    (See also: Threat model)

    Also known as “pen-testing,” this is the process where security researchers “stress-test” the security of a product, network, or system, usually by attempting to modify the way that the product typically operates. Software makers may ask for a pen-test on a product, or of their internal network, to ensure that they are free from serious or critical security vulnerabilities, though a pen-test does not guarantee that a product will be completely bug-free.

    Phishing is a type of cyberattack where hackers trick their targets into clicking or tapping on a malicious link, or opening a malicious attachment. The term derives from “fishing,” because hackers often use “lures” to convincingly trick their targets in these types of attacks. A phishing lure could be attachment coming from an email address that appears to be legitimate, or even an email spoofing the email address of a person that the target really knows. Sometimes, the lure could be something that might appear to be important to the target, like sending a forged document to a journalist that appears to show corruption, or a fake conference invite for human rights defenders. There is an often cited adage by the well-known cybersecurity influencer The Grugq, which encapsulates the value of phishing: “Give a man an 0day and he’ll have access for a day, teach a man to phish and he’ll have access for life.”

    (Also see: Social engineering)

    Ransomware is a type of malicious software (or malware) that prevents device owners from accessing its data, typically by encrypting the person’s files. Ransomware is usually deployed by cybercriminal gangs who demand a ransom payment — usually cryptocurrency — in return for providing the private key to decrypt the person’s data.

    In some cases, ransomware gangs will steal the victim’s data before encrypting it, allowing the criminals to extort the victim further by threatening to publish the files online. Paying a ransomware gang is no guarantee that the victim will get their stolen data back, or that the gang will delete the stolen data.

    One of the first-ever ransomware attacks was documented in 1989, in which malware was distributed via floppy disk (an early form of removable storage) to attendees of the World Health Organization’s AIDS conference. Since then, ransomware has evolved into a multibillion-dollar criminal industry as attackers refine their tactics and hone in on big-name corporate victims.

    (See also: Malware; Sanctions)

    Remote code execution refers to the ability to run commands or malicious code (such as malware) on a system from over a network, often the internet, without requiring any human interaction from the target. Remote code execution attacks can range in complexity but can be highly damaging when vulnerabilities are exploited.

    (See also: Arbitrary code execution)

    Cybersecurity-related sanctions work similarly to traditional sanctions in that they make it illegal for businesses or individuals to transact with a sanctioned entity. In the case of cyber sanctions, these entities are suspected of carrying out malicious cyber-enabled activities, such as ransomware attacks or the laundering of ransom payments made to hackers.

    The U.S. Treasury’s Office of Foreign Assets Control (OFAC) administers sanctions. The Treasury’s Cyber-Related Sanctions Program was established in 2015 as part of the Obama administration’s response to cyberattacks targeting U.S. government agencies and private sector U.S. entities.

    While a relatively new addition to the U.S. government’s bureaucratic armory against ransomware groups, sanctions are increasingly used to hamper and deter malicious state actors from conducting cyberattacks. Sanctions are often used against hackers who are out of reach of U.S. indictments or arrest warrants, such as ransomware crews based in Russia.

    A sandbox is a part of a system that is isolated from the rest. The goal is to create a protected environment where a hacker can compromise the sandbox, but without allowing further access to the rest of the system. For example, mobile applications usually run in their own sandboxes. If hackers compromise a browser, for example, they cannot immediately compromise the operating system or another app on the same device. 

    Security researchers also use sandboxes in both physical and virtual environments (such as a virtual machine) to analyze malicious code without risking compromising their own computers or networks.

    SIM swapping is a type of attack where hackers hijack and take control of a person’s phone number, often with the goal of then using the phone number to log into the target’s sensitive accounts, such as their email address, bank account, or cryptocurrency wallet. This attack exploits the way that online accounts sometimes rely on a phone number as a fallback in the event of losing a password.

    SIM swaps often rely on hackers using social engineering techniques to trick phone carrier employees (or bribing them) into handing over control of a person’s account, as well as hacking into carrier systems.

    Social engineering is the art of human deception, and encompasses several techniques a hacker can use to deceive their target into doing something they normally would not do. Phishing, for example, can be classified as a type of social engineering attack because hackers trick targets into clicking on a malicious link or opening a malicious attachment, or calling someone on the phone while pretending to be their employer’s IT department.

    Social engineering can also be used in the real world, for example, to convince building security employees to let someone who shouldn’t be allowed to enter the building. Some call it “human hacking” because social engineering attacks don’t necessarily have to involve technology. 

    (Also see: Phishing)

    A broad term, like malware, that covers a range of surveillance monitoring software. Spyware is typically used to refer to malware made by private companies, such as NSO Group’s Pegasus, Intellexa’s Predator, and Hacking Team’s Remote Control System, among others, which the companies sell to government agencies. In more generic terms, these types of malware are like remote access tools, which allows their operators — usually government agents — to spy and monitor their targets, giving them the ability to access a device’s camera and microphone or exfiltrate data. Spyware is also referred to as commercial or government spyware, or mercenary spyware.

    (See also: Stalkerware)

    Stalkerware is a kind of surveillance malware (and a form of spyware) that is usually sold to ordinary consumers under the guise of child or employee monitoring software but is often used for the purposes of spying on the phones of unwitting individuals, oftentimes spouses and domestic partners. The spyware grants access to the target’s messages, location, and more. Stalkerware typically requires physical access to a target’s device, which gives the attacker the ability to install it directly on the target’s device, often because the attacker knows the target’s passcode. 

    (See also: Spyware)

    What are you trying to protect? Who are you worried about that could go after you or your data? How could these attackers get to the data? The answers to these kinds of questions are what will lead you to create a threat model. In other words, threat modeling is a process that an organization or an individual has to go through to design software that is secure, and devise techniques to secure it. A threat model can be focused and specific depending on the situation. A human rights activist in an authoritarian country has a different set of adversaries, and data, to protect than a large corporation in a democratic country that is worried about ransomware, for example. 

    (See also: Operational security)

    When we describe “unauthorized” access, we’re referring to the accessing of a computer system by breaking any of its security features, such as a login prompt or a password, which would be considered illegal under the U.S. Computer Fraud and Abuse Act, or the CFAA. The Supreme Court in 2021 clarified the CFAA, finding that accessing a system lacking any means of authorization — for example, a database with no password — is not illegal, as you cannot break a security feature that isn’t there. 

    It’s worth noting that “unauthorized” is a broadly used term and often used by companies subjectively, and as such has been used to describe malicious hackers who steal someone’s password to break in through to incidents of insider access or abuse by employees. 

    A virtual private network, or VPN, is a networking technology that allows someone to “virtually” access a private network, such as their workplace or home, from anywhere else in the world. Many use a VPN provider to browse the web, thinking that this can help to avoid online surveillance.

    TechCrunch has a skeptics’ guide to VPNs that can help you decide if a VPN makes sense for you. If it does, we’ll show you how to set up your own private and encrypted VPN server that only you control. And if it doesn’t, we explore some of the privacy tools and other measures you can take to meaningfully improve your privacy online.

    A vulnerability (also referred to as a security flaw) is a type of bug that causes software to crash or behave in an unexpected way that affects the security of the system or its data. Sometimes, two or more vulnerabilities can be used in conjunction with each other — known as “vulnerability chaining” — to gain deeper access to a targeted system. 

    (See also: Bug; Exploit)

    Malicious attacks can sometimes be categorized and described by the amount of user interaction that malware, or a malicious hacker, needs in order to achieve successful compromise. One-click attacks refer to the target having to interact only once with the incoming lure, such as clicking on a malicious link or opening an attachment, to grant the intruder access. But zero-click attacks differ in that they can achieve compromise without the target having to click or tap anything. Zero-clicks are near-invisible to the target and are far more difficult to identify. As such, zero-click attacks are almost always delivered over the internet, and are often reserved for high-value targets for their stealthy capabilities, such as deploying spyware.

    (Also see: Spyware)

    A zero-day is a specific type of security vulnerability that has been publicly disclosed or exploited but the vendor who makes the affected hardware or software has not been given time (or “zero days”) to fix the problem. As such, there may be no immediate fix or mitigation to prevent an affected system from being compromised. This can be particularly problematic for internet-connected devices. 

    (See also: Vulnerability)

    First published on September 20, 2024.


  • Apple Watch arrived on buyers’ wrists 10 years ago

    Apple Watch arrived on buyers’ wrists 10 years ago


    Years after rumors started, months after it was announced, and a week after preorders began, the Apple Watch became a reality for millions of users, starting on April 24, 2015.

    Unless you were seriously into Rolex, there’s a decent chance that you had stopped wearing a watch once your iPhone had become part of your life. It’s not true that everyone stopped, but a noticeable number did — and then it seemed as if they all came back in 2015.

    For years before then, the very idea of an “iWatch” was both mocked and longed for. After it was launched in 2015, after Apple Watch became a reality, it was still mocked a little, and it was still longed for a lot.

    But it was also bought. Today, according to statistics collated by Business of Apps, up to the end 2024, Apple has sold over 300 million of the Apple Watch.

    That has to be an approximation as Apple does not release figures, but then neither does Samsung. Based on similar approximations by Sammobile, though, it’s estimated that Samsung has sold over 100 million smartwatches.

    That’s a huge number, but it’s only a third of Apple’s sales. And Samsung began selling its smartwatches two years before Apple began.

    Developing the Apple Watch

    Apple’s now ex-chief designer Jony Ive has claimed that discussions about the Apple Watch didn’t start until early 2012, and specifically after the death of Steve Jobs the year before. The New York Times wants to differ, though, as it said in December 2011 that Apple had been working on a watch “over the last year.”

    “A person with knowledge of the company’s plans told me that a ‘very small group of Apple employees’ had been conceptualizing and even prototyping some wearable devices,” he wrote. “One idea being discussed is a curved-glass iPod that would wrap around the wrist; people could communicate with the device using Siri, the company’s artificial intelligence software.”

    A sketch of an open hand wearing a wristband labeled 'CONTINUUM' with an arrow pointing to the wristband marked 408.
    Hidden in an early 2010s patent was this Apple Watch design

    “The brain that brings all these things together is the smartphone, which after all is really the first wearable computer,” he continued. “Researchers note that the smartphone is almost never more than three feet away from its user.”

    In a disagreement between Ive and the New York Times over Ive’s own work, you have to side with the designer. Except there was an Apple patent application that mentioned “a wrist-watch device” — and that application was in December 2007.

    Patents always try to cover the greatest possible number of uses of the technology they describe, the better to help with any future legal cases. But even if it were only a passing thought in 2007, it was still a passing thought about an Apple Watch.

    Not only was it a thought for someone at Apple, there were AppleInsider forum members asking about a Watch. They were asking about it even earlier, in 2005, and for one clear reason.

    At that point, Apple had launched the iPod nano and it was so small that it could be worn as a watch. And people did it, people did convert their iPod nano devices into a watch.

    It’s a long road from an iPod that plays music, to a device that actually saves lives. But the demand was there and the idea was there.

    The clues kept coming

    That 2007 patent may or may not have been serious, by 2013 there was no doubt. While it could still have chosen not to go further — see the Apple Car and how that project was cancelled — Apple was very seriously researching a watch.

    Forget trying to cover all bases, another patent was for a “bi-stable spring with flexible display,” and its illustrative diagrams include ones with such a device worn on the wrist. Apple called it a bracelet, so perhaps it wasn’t then confident of getting everything into a watch-sized device, but it was trying.

    “With a touch screen user input a user can accomplish a number of different tasks including adjusting the order of a current playlist, and reviewing a list of recent phone calls,” said the patent. “A response to a current text message can even be managed given a simple virtual keyboard configuration across the face of the flexible display.”

    In retrospect, we can see just how serious Apple was, and not just because we now have Apple Watches. In that same year of 2013, former Adobe chief technology officer Kevin Lynch joined Apple as a — something.

    Even he didn’t know. Seriously.

    Lynch was hired before being told what he would be working on. And if that’s a sign of secrecy, this is a sign of the state of progress on the Apple Watch at that time — Lynch had to skip Apple’s usual induction program.

    Instead, he went straight to the Apple Watch studio. He wasn’t working on his own and he wasn’t working with a blank slate, but he also wasn’t working with any functioning Apple Watches. Or a functioning watchOS.

    Lynch joined Apple in March 2013. Then in September 2014, Tim Cook formally announced the Apple Watch.

    Announcing and launching the Apple Watch

    It’s a very long time since Apple has been able to reveal a device and say “available today.” That’s partly because of the sheer scale it has to work at now, and partly because so many of its devices have to go through the FCC approval process.

    Rather than wait for any possible leaks from that process, Apple steps out into the spotlight first. And on September 9, 2014, Apple unveiled the iPhone 6.

    And the iPhone 6 Plus. It unveiled Apple Pay. It shoved U2 into our iTunes libraries.

    “We’ve really gone through enough to call it day,” said Cook. “But we’re not quite finished yet. We have one more thing.”

    “We love to make great products that really enrich people’s lives,” he continued. “We love to integrate hardware, software, and services seamlessly. We love to make technology more personal, and allow our users to do things that they could never have imagined.”

    “We’ve been working incredibly hard for a long time on an entirely new product,” he said. “And we believe this product will redefine what people expect from its category.”

    I am so excited and I am so proud to share it with you this morning. It is the next chapter in Apple’s story,” he concluded in his low-key, downbeat kind of style.

    One wait ended, another began

    After years upon years of heightened speculation only really equalled since by the Apple Vision Pro, the Apple Watch was real — and nobody could buy one. Not for another 227 days until April 24, 2015.

    During that time, Cook even had to reassure us all that the Apple Watch really was launching. And if we believed him about the launch date, plenty of people did not buy a word of his hype about the device in general.

    AppleInsider was cautious about it, too, and in a way that now seems prescient — or at least practical.

    “We believe the Apple Watch has huge potential, and very real benefits right now,” we said at the time. “But if the decision is to buy a Watch now or wait until the next generation, and you’re not the typical early adopter, maybe you should wait. Or at the very least, buy the cheapest Sport model you can.”

    Renumbering the Apple Watch

    What arrived on people’s wrists starting April 24, 2015, was just called the Apple Watch. Or it was called ludicrously expensive, if you went for the gold-plated edtion.

    Fast forward a year to September 2016, and suddenly the Apple Watch had numbers. Lots of them.

    There was the brand-new Apple Watch Series 2, but also a revised version of the original, now called Apple Watch Series 1. The original original, the un-revised one, started to be known as the Series 0.

    After that, and to this day, there has been a new Apple Watch every year. It would be highly unusual if 2025 didn’t see an Apple Watch Series 11 in September.

    It would also be unusual if absolutely every year saw a major change, a truly major improvement in the Apple Watch. But such a change did happen with the Apple Watch Series 4 in 2018.

    “Every bone in my body tells me this is very significant,” Jony Ive said at the time. “I’m so zealous about the Watch because I see it as making a material difference to people’s quality of life and actually their ability to be alive.”

    By the time of the Apple Watch Series 4, Apple was seeing its role as very clearly one to do with health. Previously it might have been health, might have been fashion, and it might have been anything, but now Apple knew what it had.

    And it added an EKG to the Apple Watch Series 4. It has kept adding new health features ever since — or sometimes, it at least tried to.

    Smartwatch on wrist displaying blood oxygen level at 97%, with blue and pink watchband, alongside a silver chain bracelet.
    Apple Watch’s blood oxygen sensor

    One of those health features concerned using light to measure blood oxygen levels. And in 2020, that prompted medical device manufacturer Masimo to sue Apple over the Apple Watch Series 6.

    That case rumbled on until the subject was the Apple Watch Series 9, which was hit by an import ban in the US. Masimos versus Apple may never be sorted out, but in the meantime Apple has disabled that blood oxygen sensor — and Masimos’s CEO has stepped down.

    Beyond the Apple Watch

    Masimo’s legal challenge wasn’t only about the Apple Watch Series 9. It also covered the Apple Watch Ultra.

    The first version of that was launched in 2022, bringing with it a larger screen, greater waterproofing for divers — and an Action Button. That customizable physical button has since spread to the iPhone, but it began on the Apple Watch Ultra.

    While this larger model doesn’t get updated every year, or at least not significantly, nor does the other newer entrant to the range. Apple Watch SE was launched even earlier than the Apple Watch Ultra, coming out in 2020 — and without any blood oxygen feature to trip it up in lawsuits.

    A dark smartwatch displays a red compass and navigation interface with various symbols and numbers on its screen.
    Apple Watch Ultra looks cool. Or possibly evil.

    That was less from trying to avoid legal hassles, and more to offer a cheaper Apple Watch while not cannibalizing sales from the regular Apple Watch.

    Apple Watch Ultra is ostensibly aimed at rugged, outdoor sports people, and the Apple Watch SE is at least partly aimed at parents buying for their children. In practice, adults and coach-potatoes wear either, but Apple has at least spaced the models out at steadily higher price points.

    Ten years on

    Maybe because a watch is such a personal device, but it does still feel as if the Apple Watch is a new product — until you see an Apple Watch Series 0 again. Today that original Watch seems impossibly small, practically unusably so, and it is limited.

    The current Apple Watch Series 10 still needs you to have an iPhone. But where the iPhone was a crucial umbilical cord for the original Apple Watch, now it’s far more possible to leave your phone behind and rely on your wrist-watch.

    But that’s not a casual use of the word “rely,” either. It’s not rely on it in just the sense of being used to having it around.

    A smart watch with a black display showing the time is partially covered by a brown sweater sleeve on a wrist.
    Apple Watch SE 2

    Instead, Apple Watch is helping people watch their weight, and perhaps especially so since it is tightly-integrated into Apple Fitness+, which launched in 2020.

    And you need to read this. In 2021, AppleInsider‘s Mike Wuerthele wrote about the death of his daughter, and in a piece where you feel the howling anguish, he explains how this little Apple Watch device on his wrist helped him.

    It’s no Apple fan’s enthusing, given that this piece was the third in a series about him being essentially forced to wear one. It’s a man driven to Takotsubo cardiomyopathy by despair and grief, and alerted to it by his Apple Watch.

    I asked him about it while writing this. He and his doctors both concur that it saved his life.

    That’s not some Apple toy, not some nice but unnecessary iPhone upgrade. It’s a personal device making a difference in people’s lives.

    Whatever comes next with the Apple Watch Series 11 and beyond, it is going to continue to be this. It’s going to be health.

    “If you zoom out into the future, and you look back, and you ask the question, ‘What was Apple’s greatest contribution to mankind?’” said Tim Cook in 2019, “it will be about health.”


  • AirPods 4 ANC, M4 MacBook Air, Apple Watch Ultra 2, more 9to5Mac

    AirPods 4 ANC, M4 MacBook Air, Apple Watch Ultra 2, more 9to5Mac


    Today’s Apple gear deals are now alive and well starting with even lower prices on the new M4 MacBook Air lineup – just about all of the 13-inch configurations have now dropped even lower with a new all-time low now live on the most affordable model in brand-new condition. From there we move over to a notable $79 price drop on AirPods 4 with Active Noise Cancellation down at $99.99 shipped in Best Buy certified refurbished condition alongside the black Apple Watch Ultra 2 configs back down at the lowest price we have tracked on Amazon this year. All of that and more, alongside details on tonight’s Switch 2 pre-orders are waiting below. 

    AirPods 4 with Active Noise Cancellation are $79 off today (Best Buy certified refurbished)

    While we have tracked a few chances to save on the latest AirPods 4 with Active Noise Cancellation, there hasn’t been quite as many deals on those as we have seen on the base model set without the ANC or AirPods Pro 2. There was a short-lived 1 day offer on a refurbished set over the weekend at $85, but we wanted to touch down this morning to highlight a notable chance to save as part of the now live Best Buy Outlet sale that has official Geek Squad certified refurbished units down at $99.99 shipped – the second lowest price we have tracked to date on AirPods 4 with ANC.

    Apple’s AirPods 4 with Active Noise Cancellation released last fall for the first time alongside the base model set, iPhone 16, and the black Apple Watch Ultra 2. They carry a $179 list price but have been readily available on Amazon for $169 for months like they are right now. Today’s deal knocks $79 off the list to deliver a price at $39 under the best new condition deal we have tracked to date at Amazon – that price only happened once for Black Friday and hasn’t returned since.

    The units we are featuring here today are Best Buy Geek Squad certified refurbished covered under Best Buy’s Return & Exchange Promise. They have been “thoroughly, painstakingly and lovingly tested, so you can be sure that your device will work right, right away,” and ship with the AirPods 4 with Active Noise Cancellation, “Charging Case (USB-C) with speaker, Documentation, (USB-C Charge Cable sold separately) with 90 Days warranty.”

    Clearly some folks would prefer to just wait on a brand-new condition deal, even if it is at a higher price than today’s, and we completely understand. Refurbished headphone deals can get dicey, but we do recommend sticking with programs like the Best Buy certified, in-house Bose options, and the Amazon Premium Renewed listings if you are going to go this route. This is the lowest price around after all.

    Dive into our hands-on review of Apple’s AirPods 4 right here where we said they are “better in every way.”

    Now even lower: New Amazon lows hit Apple’s M4 MacBook Air lineup at up to $100 off, brand-new configs from $912

    In our continued effort to uncover the best possible deals on Apple’s latest M4 MacBook Air lineup, we wanted to highlight the deal Amazon is now offering on the Starlight 15-inch model with the upgraded 24GB of RAM and the 512GB SSD. Regularly $1,599, you can land this one down at $1,499 shipped to deliver a solid $100 in savings and the lowest price we have tracked to date in brand-new condition on this configuration.

    As of the time of writing only the Starlight variant is seeing the straight up $100 price drop right now – the Midnight model is at the $1,519 all-time low as well, but the other two are very near full price. For the record, even Best Buy’s open-box listings on this model are sitting at prices worth of $1,400.

    Let’s take a run down of the best new prices across the lineup over at Amazon for folks not interested in the upgraded 15-inch above – all three of the most affordable 13-inch models have now dropped an additional $10 to $20 to deliver new lows on just about all color options, much like the 15-inch configs seen below:

    • 13-inch M4 MacBook Air 16GB/256GB from $939 $912 (Reg. $999)
    • 13-inch M4 MacBook Air 16GB/512GB from $1,129 $1,097 (Reg. $1,199)
    • 13-inch M4 MacBook Air 24GB/512GB $1,319 $1,307 (Reg. $1,399)
    • 15-inch M4 MacBook Air 16GB/256GB $1,129 (Reg. $1,399)
    • 15-inch M4 MacBook Air 16GB/512GB $1,319 $1,307 (Reg. $1,399)
    • 15-inch M4 MacBook Air 24GB/512GB $1,519 (Reg. $1,599)

    While the price drops on the M4 MacBook Air have been a bit of a slow burn with just about all configs hovering in that $50 off range, we are now just starting to see a good collection of models dropping below that by as much as $100 to give folks a shot at some savings. It’s hard to say exactly how the tariff situation is going to take hold of the latest MacBooks here in terms of potential price hikes, but there are definitely some savings to be had at well below the pre-Trump MSRPs.

    Amazon brings back one of its best prices of the year on all black Apple Watch Ultra 2 models at $730

    Amazon is bringing back the black Apple Watch Ultra 2 deals, and now undercutting the spring sale price from last week. You’ll now find all three of the stock satin black titanium configurations that debuted last fall down at $729.99 shipped, including the Black Ocean Band, the Black Trail Loop, and the Dark Green Alpine Loop models. Now within $1 of the lowest price we have tracked on new-condition units all year on Amazon, you’ll want to head below for more details.

    There were some offers in the $719 range on the black Ultra 2 at Amazon for Black Friday and the holidays last year, but anything under $740 since then has been notable.

    While we were recently tracking some notable open-box listings at Best Buy to nab these same configurations for less, those deals have come and gone now with most of them landing at prices higher than Amazon’s new listing we are featuring above. You will find some “good” and “fair” condition units there for less, but we tend to only recommend going for the “excellent” condition Best Buy open-box units – it’s sort of hard to justify spending $600 or more on something that might come scratched or dented, even if you can barely see it.

    The Apple Watch Ultra 3 is expected to make its worldwide debut this fall alongside the next-generation iPhone, and we wouldn’t blame you for just holding off until then. But for me, Apple Watch, and especially the Ultra models are really more of a multi-year investment and there’s frankly no telling what pricing or deals might look like through the end of 2025 on the latest series 3 models.

    Either way, you’ll want to scope some of our coverage on 9to5Mac before you make a final decision on any of this:

    Today’s accessories and charging deals:

    Apple’s new 11-inch iPad (A16) returns to Amazon lows today from $320

    We are once again tracking another chance to score the lowest new price to date on Apple’s latest iPad (A16). Amazon is now offering the base model 128GB configuration in blue and yellow down at $319.99 shipped. The pink and silver variants are remaining at the prices we have been tracking over the last month or so starting at $329.

    Regularly $349, today’s deals certainly aren’t massive or anything but again, $320 is the lowest we have tracked on brand-new units since the latest iPad 11, or iPad (A16), debuted under two months ago. This is only the second time we have seen the blue this low and the very first time the yellow model has dropped below $329.

    Here’s how the discounted pricing works out across the lineup right now – only the 128GB variant is matching the lowest we have tracked to date.

    While for many the 128GB is going to feel underwhelming, myself included, this is Apple’s ultra-affordable entry-level tablet after all. I would argue that, for the folks interested in picking up Apple’s latest casual iPad experience, scoring the most affordable possible configuration is key – once you get up into the $400+ range you could just land a discounted iPad mini 7 or M2/3 Air.

    This iPad features a slightly larger 11-inch Liquid Retina Display, 12MP front/12MP back cameras, Wi-Fi 6, USB-C connectivity, and runs on the A16 chip – it is not Apple Intelligence-compatible, but rather a more family-friendly casual tablet experience that brings the iPad vibes home for less.

    Hit up our launch coverage over at 9to5Mac for more details.

    Just remember, if you have an older iPad 10 or something to trade-in, you can still score this model at as much as $175 off – all of the details you need to know await right here.

    FTC: We use income earning auto affiliate links. More.


  • Motorola Razr 2025 hands-on: A significant strategy shift

    Motorola Razr 2025 hands-on: A significant strategy shift


    Motorola’s 2025 Razr series is officially here, months earlier than its predecessor’s launch. It may seem odd to launch so early, as the 2024 Razr series has had less than a year to revel in its apparent success, but it seems Motorola is excited to get things rolling this year, and for good reason.

    The Razr 2025 series marks a significant shift in Motorola’s strategy, with the company launching three models this year instead of the usual two. Leading the trip is the top-end Razr Ultra 2025, which has specs that would make most standard Android flagship phones jealous, although all that power does indeed come at a price. Following are the Razr Plus 2025 and Razr 2025, the latter of which I still lovingly refer to as the Razr “Minus.”


  • Boost Your Connection for Less With These Wi-Fi Mesh Network System Deals

    Boost Your Connection for Less With These Wi-Fi Mesh Network System Deals


    There are a lot of reasons to want a strong Wi-Fi connection — whether you’re working from home, an Esports champion-in-training, or your household has a lot of simultaneously connected devices. If you find that you aren’t getting as strong a connection on one side of your home versus the other, we have just the solution for your woes: a Wi-Fi mesh network system. PCMag has tested hundreds of mesh network systems, routers, and range extenders, running them through a rigorous battery of tests for signal strength, speed, ease of setup, and more.

    Which mesh Wi-Fi network system is best for you? Consider the following: how large is your home? The more satellites included in a system, the more square footage you have available to you. Do you have a lot of connected devices? The more devices you have, the more bandwidth—measured in Mbps—you’ll need. You can find a breakdown of which Wi-Fi mesh systems are best suited for your particular use case in our helpful primer and then you can see what’s on sale below:

    Amazon eero mesh WiFi system – router replacement for whole-home coverage (3-pack)

    Eero is one of our top Readers’ Choice brands for routers and modems for its ease of use and it had the second-highest rating for satisfaction with setup. This dual-band Eero Wi-Fi mesh system three-pack covers up to 4,500 square feet and supports speeds of up to 550 Mbps. It gives you access to the 2.4GHz and 5GHz bands, providing more bandwidth for those with several simultaneously connected devices so you can avoid slowdowns even during peak streaming and gaming hours. As stated previously, setup is a cinch via the Eero app, which also allows you to manage your network remotely should you need to make any tweaks on the fly. Save $44 right now and gain whole-home coverage for less.

    TP-Link Deco XE75 Pro AXE5400 Tri-Band WiFi 6E Mesh System (3-Pack)

    Get Our Best Stories!


    Newsletter Icon


    Unlock Deals on the Latest Tech Products

    Sign up Now for the Tech Deals Newsletter

    By clicking Sign Me Up, you confirm you are 16+ and agree to our Terms of Use and Privacy Policy.

    Thanks for signing up!

    Your subscription has been confirmed. Keep an eye on your inbox!

    This TP-Link Deco AXE5400 3-pack will blanket your whole home in Wi-Fi coverage and supports up to 200 devices. Setup is easy, thanks to the Deco App, and intelligent security features (like a home network scanner and parental controls) safeguard you and your family from online dangers. You can also upgrade to HomeShield Pro for more protection features. Even those with extensive home security systems with several connected devices should have enough bandwidth when using this tri-band trio, while AI-Driven mesh intelligently optimizes your connection.

    Recommended by Our Editors

    Google Nest WiFi 6 Pro Wi-Fi 6E Tri-Band Mesh System (3-Pack)

    With up to 6,600 square feet of coverage, the Google Nest Pro offers a strong, stable network connection to every room of your home. The single mesh router and two satellites are capable of handling a large number of simultaneously connected devices due to the greater bandwidth offered by the tri-band connectivity. Because this is a Google Device, the Google Nest Pro can easily be set up and added to your smart home network via the Google Home app, which can also be used to check speeds and manage your network right from your smartphone. Our expert reviewed the Google Nest Pro and praised the easy installation, Wi-Fi 6E support, and solid performance—all of which make this Wi-Fi mesh system an easy recommendation at $54 off retail.

    More Deals to Consider to Boost Connectivity


    *Deals are selected by our commerce team

    • Best Wi-Fi Mesh Network System Deals at Amazon

    • Best Wi-Fi Mesh Network System Deals at Best Buy

    • Best Wi-Fi Mesh Network System Deals Walmart

    FAQ

    What Is a Wi-Fi Mesh System?

    Mesh Wi-Fi systems (or mesh Wi-Fi routers) are designed to extend the range of your wireless coverage. These systems consist of several networking components: a main router, which connects directly to your modem, and a series of satellite modules, or nodes, placed throughout your house. They are all part of a single wireless network, and they share the same SSID and password. 

    Which Is Better: A Wireless Mesh Router or a Range Extender?

    Wi-Fi systems are very user-friendly. Thanks to a companion app, they are a snap to set up and manage. Mesh systems offer whole-house coverage, and they provide seamless room-to-room roaming over a single network. On that second point, wireless extenders, in contrast, tend to require you to reconnect from network to network as you move in and out of range of the base router or the extender. For more about the differences between these two technologies, check out our explainer, Wi-Fi Range Extender vs. Mesh Network: What’s the Difference.

    Do Wi-Fi Mesh Systems Support Wi-Fi 6?

    Most do, and it’s the minimum Wi-Fi version you should look for on a Wi-Fi mesh system. Wi-Fi 6 (also called 802.11ax) offers fast throughput speeds (up to 9.6Gbps), low network congestion, and excellent range performance. However, if your budget allows, you should consider springing for a Wi-Fi 6E or Wi-Fi 7 system. The cutting-edge Wi-Fi 7 standard promises even better performance than those that preceded it, and it’s backward-compatible, too.

    What Is the Best Wi-Fi Mesh System to Buy?

    That depends on your budget and individual connectivity needs. The Asus ZenWiFi BQ16 Pro is our current overall top pick for Wi-Fi mesh systems, while the TP-Link Deco BE63 is our pick for the best budget option. For even more details and options, check out our guide to the best Wi-Fi systems we’ve tested. 

    What Are the Best Deals on Wi-Fi Mesh Systems?

    Expect to spend around $200 on a budget Wi-Fi 6 system for use in a smaller house with few devices, around $500 for a mainstream mesh kit, and $750 and up for a high-end Wi-Fi 7 option. If you find a well-rated system that’s cheaper than these guidelines, jump on it!

    Do Wi-Fi Mesh Routers Go on Sale During Prime Day or Black Friday?

    Yes. Mesh systems are typically frequently discounted but often receive their deepest discounts during these sales events. Plus, Amazon owns Eero, one of the leading mesh systems manufacturers. So, you should expect exceptional deals on these award-winning systems during Amazon Prime Day.

    Are There Bundle Deals on Multiple-Node Systems?

    Yes. Mesh systems get cheaper on a per-node basis the more nodes you buy. However, you should first determine how many nodes your house actually needs rather than buying a three-piece system because it’s a better per-node deal than a two-piece one. A good rule of thumb is to match your home’s square footage with the manufacturer’s rating for a given system, then add a node if you have thick walls, live in a dense neighborhood, have lots of small rooms, or have other similar situations.

    About Tom Brant

    Deputy Managing Editor

    Tom Brant

    I’m the deputy managing editor of the hardware team at PCMag.com. Reading this during the day? Then you’ve caught me testing gear and editing reviews of laptops, desktop PCs, and tons of other personal tech. (Reading this at night? Then I’m probably dreaming about all those cool products.) I’ve covered the consumer tech world as an editor, reporter, and analyst since 2015.

    I’ve evaluated the performance, value, and features of hundreds of personal tech devices and services, from laptops to Wi-Fi hotspots and everything in between. I’ve also covered the launches of dozens of groundbreaking technologies, from hyperloop test tracks in the desert to the latest silicon from Apple and Intel.

    I’ve appeared on CBS News, in USA Today, and at many other outlets to offer analysis on breaking technology news.

    Before I joined the tech-journalism ranks, I wrote on topics as diverse as Borneo’s rain forests, Middle Eastern airlines, and Big Data’s role in presidential elections. A graduate of Middlebury College, I also have a master’s degree in journalism and French Studies from New York University.

    Read Tom’s full bio

    Read the latest from Tom Brant

    About Jade Chung-Lee

    Merchandising Associate

    Jade Chung-Lee

    When she isn’t perusing online stores for deals, Jade enjoys playing video games (mostly JRPGs and roguelikes), sorting board game components neatly into containers, and building Gundam models. Her love of electronics has persisted through her youth and has resulted in a collection of gaming peripherals including keyboards and controllers, scale figures, and art work. Jade lives in blissful harmony with her wife, cat, and two chinchillas—as well as a host of houseplants.

    Read Jade’s full bio

    Read the latest from Jade Chung-Lee




  • Feature,/features,,features, Coverage | Laptop Mag

    Feature,/features,,features, Coverage | Laptop Mag


    If you think AI is mostly memes and marketing fluff, you’re not alone. Intel’s Robert Hallock was equally skeptical at one point in time. Now, he’s betting that AI, the quiet kind, will be the key to Intel unlocking the kind of power, performance, and battery life truly befitting a next-generation laptop.

    In a conversation encompassing everything from ethical AI cocoa farming to the futility of the F1 key, and the rollercoaster ride that is the Gartner Hype Cycle, Hallock shines a light on Intel’s AI ambitions, unpacks the challenges ahead, and offers a counterpoint to the hunt for AI’s killer app… All 450 and counting of them.

    An interview with Intel’s Robert Hallock

    An interview with

    Intel Vice President and General Manager of Client AI and Technical Marketing Robert Hallock
    An interview with

    Robert Hallock

    Robert is a senior director of technical marketing at Intel for Core processors and technologies. Prior to joining Intel, Robert spent 12 years in Client and Graphics at AMD, most recently as the director of product and technology marketing for Ryzen processors. Robert has also been a PC hardware reviewer, journalist, and technical writer. He moonlights as a designer of high-performance aftermarket automotive components and is a lifelong PC enthusiast.

    What’s your role in AI?