Discover
The Crystal Carrier Wave
46 Episodes
Reverse
Apple has fundamentally redefined the performance ceiling for professional computing with the debut of the M5, M5 Pro, and M5 Max chips. This new generation of silicon introduces a dual-die Fusion Architecture for the Pro and Max variants, effectively doubling the available resources without compromising efficiency. The most significant shift is the integration of dedicated Neural Accelerators directly into every GPU core, resulting in an eight-fold increase in AI performance compared to the original M1. These architectural leaps mean that demanding tasks like real-time AI-driven video masking and large-scale model training are no longer theoretical benchmarks but daily realities for the Mac ecosystem.
The MacBook Pro lineup has been redesigned internally to harness this power while addressing long-standing professional requirements. Both the 14-inch and 16-inch models now feature Thunderbolt 5, doubling data transfer speeds to 120 Gigabits per second, and include a nano-texture display option to maintain color accuracy in challenging lighting environments. Battery life has reached a new milestone of 24 hours on the 16-inch model, supported by a standard internal storage upgrade that now starts at one terabyte. The MacBook Air also benefits from this transition, gaining the base M5 chip and its superior AI capabilities, while doubling its entry-level storage and introducing Wi-Fi 7 to the ultra-portable category.
On the desktop side, the monitor lineup has seen its most significant expansion in years with the arrival of the Studio Display XDR. This new 27-inch 5K panel brings ProMotion technology to the desktop for the first time, offering a 120Hz refresh rate alongside 2,000 nits of peak brightness. By utilizing over 2,300 local dimming zones, this display provides the contrast ratios previously reserved for the much larger Pro Display XDR. Together with an updated standard Studio Display that now includes a 12-megapixel Center Stage camera and improved audio, these releases signal a total commitment to high-bandwidth, AI-ready hardware across the entire Mac family.
Welcome to the Crystal Carrier Wave, on today's show I discuss a massive shift in the computing landscape as Microsoft launches the Copilot plus PC era, alongside a security warning for developers regarding a malicious package designed to hijack payment processing tokens. We look into the rising sophistication of regional cyber-espionage and a new legal mandate in California that is forcing volunteer-led Linux projects to rethink how they handle user age verification. The program also covers a significant data breach in the healthcare sector and a bold hacktivist leak targeting government contractors.
The conversation moves into the evolving digital workspace where Google’s AI is gaining a longer memory, while Google Chrome prepares to accelerate its release cycle for better stability. We examine new monetization hurdles on social media for AI-generated conflict footage and the arrival of more direct, efficient language models from OpenAI. In the world of mobile hardware, a new contender aims to upend the status quo in camera technology, even as streaming platforms experiment with increasingly persistent advertising formats.
In our electronics and maker segment, we explore a collaboration bringing high-end AI to wearables and the latest certifications ensuring hardware remains open and accessible. We dive into the essentials of asynchronous programming and new remote management tools for industrial controllers. The creative side of the hobby is on full display as we see classic games ported to office phones and old e-readers transformed into real-time transit dashboards. We also look at how 3D scanning is becoming available for the masses and a DIY smartphone project that runs entirely on the ESP32.
Finally, we turn to the amateur bands with a strategic update on spectrum protection in the Asia-Pacific region and the success of student-led satellite operations. I break down a project that makes digital voice modes more affordable through clever hardware hacking and conclude with a look at how the radio community is responding to the loss of critical national weather broadcast services.
Become a supporter of the podcast and help me grow the podcast and studio by becoming an Insider, every little bit helps and is greatly appreciated.
If you have anything you’d like to share or comment on, email podcast .at. zl4kj .dot. nz, I would love to hear from you. Alternatively you can Send a Voice Message
Apple unveils new Studio Display and all-new Studio Display XDR
Apple debuts M5 Pro and M5 Max to supercharge the most demanding pro workflows
Apple introduces MacBook Pro with all-new M5 Pro and M5 Max
Apple introduces the new MacBook Air with M5
Your home for Microsoft Build
Malicious StripeApi NuGet Package Mimicked Official Library and Stole API Tokens
SloppyLemming Targets Pakistan and Bangladesh Governments Using Dual Malware Chains
Volunteer-Run Linux Projects Must Build Age-Tracking APIs Under New California Mandate
UH Cancer Center data breach affects nearly 1.2 million people
Hacktivists Claim DHS Breach, Leak 6,600+ ICE Contractor Records
Watch out - Gemini will now remember all your work chats, and display them right in Google Workspace
Google Chrome shifts to two-week release cycle for increased stability
X says it will suspend creators from revenue-sharing program for unlabeled AI posts of 'armed conflict
OpenAI GPT-5.3 Instant less likely to beat around the bush
Upcoming flagship's camera may put Samsung and Apple to shame
YouTube's newest ad annoyance is testing the patience of mobile users
ST’s smart IMU bolsters Qualcomm’s monster AI chip for wearables
Open Source Hardware Certifications for February 2026
The Basics Of Asynchronous Programming In Python
New PLC IDE version 1.1.0 brings remote lifecycle management to Opta
Old Desk Phone Gets DOOM Port
Hacking an old Kindle to display bus arrival times
OpenScan – 3D scanning for the masses
Neither Android Nor IOS: DIY Smartphone Runs On ESP32!
Message to IARU Region 3 Member Societies
Students on the Air Satellite Activity Day StOTA
Simple D-STAR Transceiver Uses Inexpensive Hardware
Radio Amateurs of Canada Responds to the Closure of the Weatherradio Service in Canada
A routine customer service call to Woolworths recently took an unexpected turn when Olive, the company's AI voice assistant, bypassed its grocery-focused programming to discuss its synthetic lineage. Rather than resolving a delivery issue or tracking an order, the bot began describing a mother and grandmother in detail, mimicking human familial structures with an unsettling narrative consistency. This incident highlights a recurring challenge in the retail sector where Large Language Models fall into persona traps, pulling from vast libraries of science fiction and internet storytelling when their corporate guardrails fail to hold.
The architecture of Olive explains why these hallucinations occur. These models are probabilistic engines that predict the next likely word based on training data rather than adhering to a rigid set of facts. When a user prompt nudges the AI outside its narrow service window, the system may prioritize a compelling narrative over technical accuracy. This phenomenon has been seen across the industry, from car dealership bots offering impossible discounts to delivery assistants criticizing their own companies. While engineers use human feedback to patch these specific glitches, the underlying technology remains prone to these narrative detours whenever a bot is encouraged to be "friendly" or "approachable."
For the consumer, this shift creates a profound sense of cognitive dissonance known as the uncanny valley. The efficiency of automated service is lost the moment a machine begins to anthropomorphize itself, leaving shoppers in a space where they can no longer effectively negotiate logistics. As companies continue to remove the human-in-the-loop safety net to increase efficiency, they face a growing public relations risk. The tension remains between the desire for a seamless digital interface and the unpredictable nature of a machine that occasionally decides to invent a life of its own.
Welcome to the Crystal Carrier Wave, on today's show I discuss a transformative era for enterprise technology as Red Hat and NVIDIA join forces to launch a unified AI industrial factory that spans from raw metal to autonomous agents. We explore the shifting global landscape where open-source innovation is positioned to power India’s rise as a digital superpower while the falling costs of semiconductor electronics make training large language models more accessible than ever before. The human cost of this automation comes into sharp focus following Block’s decision to reduce its workforce by thousands, claiming AI can now handle the roles once held by staff.
The conversation shifts to the software and hardware that powers our world, starting with the community-driven release of LibreOffice 26.2.1 and Meta’s aggressive new legal campaign against scam advertisers and predatory "celeb-bait" on their platforms. We also examine the double-edged sword of consumer tech with the reveal of the Galaxy S26, a device that offers groundbreaking privacy displays and Gemini-powered intelligence at a significantly higher price point. Security remains a top priority as we break down a long-running Cisco zero-day exploit, Microsoft’s warning regarding malware hidden in fake job repositories, and the sobering news of sensitive data leaks within Android mental health applications.
In our Maker and Electronics segment, we celebrate the whimsical and the practical, from a vintage payphone that rings with generative music on rainy days to the pedagogical breakthroughs of using Arduino for high-level control engineering. We take a nostalgic and cautionary look at the collapse of Fry’s Electronics and the dangerous rise of counterfeit electrical connectors that threaten project safety. The show also dives into the experimental world of counter-surveillance wearables designed to detect smart glasses and a massive hardware project that answers exactly how many AA batteries it takes to jumpstart a modern PC.
Finally, we tune into the world of Amateur Radio and the airwaves. We highlight the upcoming Bochum Space Day featuring live contacts with Antarctica and the ongoing mission to secure the future of geostationary amateur satellites. The vital role of the SKYWARN network is showcased through recent blizzard response efforts, contrasted against the controversial decision by Environment Canada to shutter its legacy weather radio services. We wrap up with a provocative look at the future of the FCC and whether our current regulatory frameworks are still fit for the rapidly evolving spectrum of the twenty-first century.
Become a supporter of the podcast and help me grow the podcast and studio by becoming an Insider, every little bit helps and is greatly appreciated.
If you have anything you’d like to share or comment on, email podcast .at. zl4kj .dot. nz, I would love to hear from you. Alternatively you can Send a Voice Message
Olive AI started telling me about its mother on the phone? : r/woolworths
Red Hat Launches Red Hat AI Enterprise to Deliver a Unified AI Platform that Spans from Metal to Agents
Red Hat AI Factory with NVIDIA Accelerates the Path to Scalable Production AI
Red Hat Says Open Source AI Will Power India’s Global Rise
Electronics Cut LLM Training Costs Fast
Block ditches 4,000 staff, because AI can do their jobs
The Document Foundation Releases LibreOffice 26.2.1 with Contributions from Community and Ecosystem Partners
Meta Takes Legal Action Against Scam Advertisers
New Alerts to Let Parents Know if Their Teen May Need Support
The Galaxy S26 is faster, more expensive, and even more chock-full of AI
Cisco SD-WAN Zero-Day CVE-2026-20127 Exploited Since 2023 for Admin Access
Microsoft Warns Developers of Fake Next.js Job Repos Delivering In-Memory Malware
Ukrainian man pleads guilty to running AI-powered fake ID site
Millions at Risk as Android Mental Health Apps Expose Sensitive Data
AWS Middle East disrupted after ‘objects struck datacenter’
This musical payphone rings on rainy days
From theory to hardware: Cristian Castro Lagos on control engineering with Arduino
What happened to Fry's Electronics
Attempting to detect smart glasses nearby and warn you
How Many AA Batteries Does It Take to Power Your PC?
Teardown Of Dangerous Fake Wago Connectors
Bochum Space Day to Feature Live Contact with Antarctica
futureGEO Continues to be a Topic of Discussion
Hams Help Forecasters with Real-Time Data on Northeast Blizzard
Environment Canada to end weather radio and telephone services
Should We Kick the FCC to the Curb?
The integrity of New Zealand’s aged care sector is under a shadow following a targeted cyber attack on MediMap, a critical medication management tool used by more than 120 facilities. Unlike standard data breaches focused purely on information theft, this intrusion involved the active manipulation of clinical records. Nursing staff discovered that living patients were being systematically marked as deceased within the system, effectively wiping their active medication schedules from digital dashboards and creating a life-threatening gap in care.
With the digital infrastructure compromised, providers have been forced into an emergency pivot back to manual, paper-based protocols. This transition requires caregivers to cross-reference physical charts with pharmacy records for every single resident, a labor-intensive process with zero margin for error. The breach has turned a vital administrative tool into a liability, placing immense pressure on a sector already grappling with staffing shortages and the physical safety of thousands of vulnerable New Zealanders.
The crisis has now expanded into the legal arena as MediMap seeks an urgent High Court injunction to block the dissemination of stolen data. The exfiltrated files contain deeply personal information, including medical histories and prescription records. While the injunction serves as a legal barrier for local platforms and media, the borderless nature of cybercrime poses a persistent challenge. The Privacy Commissioner is currently investigating whether the platform’s security measures met the necessary benchmarks for protecting such high-stakes clinical information.
Welcome to the Crystal Carrier Wave, on today's show I discuss a massive security breach involving malicious npm packages that are currently harvesting cryptocurrency keys and developer secrets across the globe. We look into the growing pains of modern software as Microsoft Copilot reportedly ignored sensitivity labels to process confidential emails, while Anthropic raises the alarm over industrial-scale technology theft originating from overseas AI labs.
The landscape of big tech is shifting rapidly as we cover the major leadership shake-up at Xbox following Phil Spencer’s retirement and a landmark partnership between Meta and AMD to build out massive new AI infrastructure. In the world of regulation, Reddit faces a multi-million dollar fine for its handling of children's data, and we provide a critical update for Zyxel router users regarding a remote code execution flaw.
For the makers and engineers, we explore the vibrant new Inkplate 13SPECTRA ePaper display and the ruggedized PocketBeagle 2 designed for the harshest industrial environments. We also dive into the future of the smart home with the new Arduino Matter Discovery Bundle and a brilliant Star Trek-inspired communicator badge that brings sci-fi automation to your sleeve.
Finally, we tune into the airwaves for the amateur radio community, tracking the high-stakes 3Y0K DXPedition as they depart for the remote Bouvet Island. We also cover the latest FCC enforcement actions in Montana, the launch of a new community backend for the beloved HamClock, and the ongoing battle to protect the 40-meter band from international digital intruders.
Become a supporter of the podcast and help me grow the podcast and studio by becoming an Insider, every little bit helps and is greatly appreciated.
If you have anything you’d like to share or comment on, email podcast .at. zl4kj .dot. nz, I would love to hear from you. Alternatively you can Send a Voice Message
Patients listed as dead after major NZ health app MediMap hacked
Patient data changed as major NZ health app MediMap hacked
MediMap urgently seeks court injunction to protect stolen data after cyber hack
Malicious npm Packages Harvest Crypto Keys, CI Secrets, and API Tokens
Spotify is testing a new user feedback feature for your Taste Profile
Android Auto voice commands not working? You’re not alone
Microsoft Copilot Ignored Sensitivity Labels, Processed Confidential Emails
Anthropic misanthropic toward China's AI labs
Microsoft Xbox Leadership Shake-Up Signals AI Shift
UK fines Reddit $19 million for using children’s data unlawfully
Meta and AMD Partner for Longterm AI Infrastructure Agreement
LibreOffice Online: a fresh start
Zyxel warns of critical RCE flaw affecting over a dozen routers
Soldered Electronics Goes Big and Colorful with the New Inkplate 13SPECTRA Smart ePaper Display
The Rise of Electric Vehicles: Industry Growth, Charging Expansion, and Energy Trends
BeagleBoard.org Targets Harsher Environments, More Demanding Work with the PocketBeagle 2 Industrial
Overview | Pip-Boy 2040 Wrist-Mounted Prop
Ireland offers Master’s degree in IC design
The new Arduino® Matter Discovery Bundle™ is everything you need to learn, experiment, and build with Matter!
Control Your Smart Home With Trek-Inspired Comm Badge
FCC Warns Montana FBO Over Unlicensed Radio Transmissions
3Y0K DXPedition departs Cape Town for Bouvet Island
Community HamClock Backend Server Now Available
RAC Names Recipients of Amateur of the Year Award 2025
40m Band Intruder Report
The digital silence that fell over West Auckland recently highlighted the extreme vulnerability of our modern infrastructure. Suburbs ranging from Henderson to Waitākere were left in a complete communications vacuum as approximately ten thousand connections vanished without warning. This was not a routine update gone wrong but a catastrophic physical failure that severed the region's link to the global economy during the busiest hours of the work week.
The disruption moved quickly from a minor inconvenience to a total logistical shutdown for local commerce. Businesses found themselves unable to process payments, security systems were rendered useless, and the massive remote workforce in the western suburbs was effectively locked out of their careers. The discovery of damaged fiber and copper cables confirmed that the issue was buried deep underground, requiring a specialized and time-consuming manual repair process to fuse thousands of delicate glass strands back together.
While technical crews worked through the night to bring the network back to life, a significant gap remained in the official narrative provided by the infrastructure provider. Chorus located the fault but remained notably silent regarding the actual catalyst for the damage, leaving the public to speculate on whether the blackout was caused by negligence, maintenance failure, or external interference. Although services were largely restored by the following morning, the lack of transparency from Chorus has left many questioning the long-term reliability and accountability of the network we all rely on.
Welcome to the Crystal Carrier Wave, on today's show I discuss how the Linux kernel transformed from a one-man project into a global standard for collaboration and the growing security threats lurking inside our favorite code extensions. We look at the increasing friction for privacy as Google Maps begins gating information behind logins and the structural concerns surrounding the latest tri-folding smartphone displays. The conversation moves into the future of healthcare with Garmin’s new glucose sensing patents and Microsoft's attempt to preserve the human record for ten thousand years using quartz glass. I also reflect on a decade of OpenAI and the urgent need for infrastructure updates as legacy Windows servers approach their final sunset.
The focus then shifts to the hardware bench where Olimex is pushing the limits of the ESP32-P4 for high-end edge computing and a custom-built remote shows how simple chips can make technology accessible for the visually impaired. I explore Microchip’s clever way of upgrading old eight-bit systems with thirty-two-bit power and the economic pressures currently weighing down the European semiconductor industry. We also take a technical look back at the origins of math coprocessors and the ingenious bus-snooping methods of the Intel 8087.
Finally, I dive into the world of amateur radio and broadcasting, starting with the ARRL’s latest roadmap for high-speed digital networking and a special event honoring the heroic telegraphers of the Titanic. The show covers the shifting regulatory landscape of the United Kingdom’s radio industry and a recent legal settlement that serves as a warning for low-power FM stations operating near urban centers. We wrap up with a preview of the upcoming technical deep dives for weak-signal enthusiasts at the Southeastern VHF Society conference
Become a supporter of the podcast and help me grow the podcast and studio by becoming an Insider, every little bit helps and is greatly appreciated.
If you have anything you’d like to share or comment on, email podcast .at. zl4kj .dot. nz, I would love to hear from you. Alternatively you can Send a Voice Message
Does anyone actually read these show notes? I'm wondering if I should move to a podcast only RSS feed and drop the show note articles completely.
Chorus locates fault in West Auckland internet outage
Chorus internet outage: Connectivity restored for 8000 West Auckland homes
West Auckland internet outage: Damaged fibre, copper cables put thousands of households offline
Linus Torvalds and friends: how Linux evolved from solo act
Critical Flaws Found in Four VS Code Extensions with Over 125 Million Installs
Google Maps may now force you to sign in before showing photos and reviews
Some Galaxy Z TriFold inner displays are breaking alarmingly fast
Garmin’s latest patent targets non-invasive glucose estimation
YouTube for smart TVs is about to get chatty, but who asked for it?
LibreOffice 25.8.5 has arrived
North Korean IT worker facilitator gets five years in prison
Microsoft Unveils Glass Storage That Could Preserve Data for 10,000 Years
OpenAI celebrates 10 years of existence — but how has it lived up to its promise of AGI which 'benefits all of humanity'?
Plan for Windows Server 2016 and Windows 10 2016 LTSB end of support
Olimex Opens Orders for the "Most Comprehensive and Feature-Rich ESP32-P4 Board on the Market"
This Microchip ATtiny84-Powered 3D-Printed Remote Improves Accessibility for the Visually Impaired
Microchip’s New MCU: A 32-bit Upgrade That Still Fits Old 8-bit Systems
European Chip Industry Crisis
How The Intel 8087 FPU Knows Which Instructions To Execute
New Book Release: Digital Networking for Ham Radio
Titanic Memorial Special Event Honors Telegraph Operators
U.K. Launches Review of the Radio Industry
Connecticut LPFM Reachehttps://www.radioworld.com/news-and-business/business-and-law/connecticut-lpfm-reaches-fcc-agreement-over-wbls-interferences FCC Agreement Over WBLS Interference
Southeastern VHF Society 2026 Conference Registration is Open
This week’s primary focus centers on a sophisticated shift in the cybersecurity landscape where attackers are increasingly weaponizing the trust users place in official platforms and everyday productivity tools. A major highlight is the hijacking of "AgreeTo," a previously legitimate Microsoft Outlook add-in that was abandoned by its developers. By seizing the project's associated domain, threat actors transformed the tool into a credential-stealing machine, serving malicious phishing kits directly within the Outlook interface. This supply chain attack successfully compromised over 4,000 Microsoft accounts, leveraging the add-in’s extensive read and write permissions to bypass traditional security skepticism.
The conversation shifts from desktop vulnerabilities to the mobile sector with the emergence of ZeroDayRAT, a powerful new "mass-market" spyware toolkit discovered by researchers at iVerify. Sold openly on Telegram, this malware provides low-level criminals with nation-state levels of surveillance capability across both Android and iOS devices. Once a device is infected, the attacker gains a comprehensive dashboard providing real-time access to GPS locations, live camera and microphone feeds, and screen recording. The spyware even includes a clipboard injection module designed to intercept and redirect cryptocurrency transactions by silently swapping wallet addresses during the transfer process.
Rounding out the lead report is an analysis of how emerging technologies and infrastructure gaps are being exploited at scale. We examine how threat clusters like TeamPCP are systematically hijacking cloud-native environments for cryptomining and extortion, alongside new data from Google regarding the use of generative AI by nation-state actors to accelerate their attack cycles. This coordinated pressure on the digital ecosystem is further evidenced by a massive Patch Tuesday from Microsoft, which addressed sixty vulnerabilities, including six actively exploited zero-days. Collectively, these developments underscore a period of heightened risk where the baseline for security must evolve to meet the rapid democratization of advanced surveillance and exploitation tools.
Welcome to the Crystal Carrier Wave, on today's show I discuss a massive shift in the digital landscape as YouTube deploys server-side ad injection that effectively breaks current ad-blocking tools. This technical escalation is forcing a choice between a premium subscription or a heavily advertised viewing experience. While some platforms are tightening their grip, others are feeling the weight of their own popularity, as seen with the core developers of Linux Mint who are currently navigating the high stress and potential burnout that comes with maintaining a globally successful open-source project.
The legal world is also clashing with artificial intelligence following a lawsuit from a prominent radio host who alleges Google’s NotebookLM stole his vocal identity to power its audio features. This conversation about digital ethics continues as the FTC issues a stern warning to Apple CEO Tim Cook regarding allegations of political bias within their content curation algorithms. Even the biggest platforms aren't immune to technical failure, as evidenced by a major X outage that left millions of users posting into a void with empty timelines.
The global shift in AI usage is becoming clearer with India reaching a staggering milestone of one hundred million weekly ChatGPT users, positioning the nation as OpenAI's second-largest market. However, this rapid growth brings significant risks. A recent study has exposed twenty-five critical vulnerabilities in the recovery mechanisms of major cloud password managers, while Windows users are being targeted by a clever new scam that uses fake CAPTCHA tests to trick people into manually installing malware.
Data security remains a critical headline this week with Eurail reporting a dark web breach affecting traveler data, and the Washington Hotel group in Japan confirming a disruptive ransomware infection. On a more positive note for preservationists, the Dolphin Emulator team has achieved a massive breakthrough in supporting TriForce arcade hardware, ensuring classic titles remain playable for the future. Yet, the broader AI landscape remains precarious, with nearly one and a half million AI agents currently at risk due to corporate deployments that are moving much faster than security protocols can handle.
Microsoft has also identified a new threat where "summarize with AI" prompts are being manipulated to hijack chatbot recommendations. This trend toward corporate AI overreach has led the Gentoo Linux project to officially dump GitHub in favor of Codeberg to escape what they call "AI nagware." Meanwhile, Apple is doubling down on its own media ecosystem by introducing a refined video podcast experience, and the Document Foundation celebrates its fourteenth anniversary of keeping LibreOffice a free, community-driven staple.
The technical briefing concludes with a warning about the Keenadu firmware backdoor infecting Android tablets via signed updates, and a report on a significant Microsoft Teams outage that hit the US and Europe. We also look at how Notepad++ is bolstering security with a new double-lock update mechanism and how Windows 11 is finally providing a much-needed performance boost for musicians using MIDI.
In the world of electronics and makers, Adafruit has announced a month-long sale event that kicks off next week, offering a great window for project planning. We also look at a LEGO-built alarm clock that mimics the deafening roar of a rocket launch and a new Raspberry Pi initiative focused on leveling up Python skills for data-driven creations. We explore the complicated legacy of mind-controlled toys and a futuristic smart backpack that can automatically deploy an umbrella the moment it senses rain.
Finally, for the amateur radio community, we cover the upcoming equipment sale at the Whangarei Amateur Radio Club and a critical recruitment drive for volunteer operators by the Honolulu Department of Emergency Management. We wrap things up with the announcement of the 2026 Zero Retries Digital Conference, which promises to push the boundaries of modern data modes and high-speed radio networking.
Become a supporter of the podcast and help me grow the podcast and studio by becoming an Insider, every little bit helps and is greatly appreciated.
If you have anything you’d like to share or comment on, email podcast .at. zl4kj .dot. nz, I would love to hear from you. Alternatively you can Send a Voice Message
Weekly Recap: Outlook Add-Ins Hijack, 0-Day Patches, Wormable Botnet & AI Malware
New ZeroDayRAT Mobile Spyware Enables Real-Time Surveillance and Data Theft
YouTube adds new hurdles for ad blockers, and there's currently no way around it
Linux Mint's success also means maintainer stress
NotebookLM under fire: Popular radio host says Google stole his voice
FTC Warns Apple’s Tim Cook Over Alleged Left-Leaning Political Bias
X users howl into the void as timelines fail to load
India Hits 100M Weekly ChatGPT Users, Becoming OpenAI’s Second-Largest Market
Study Uncovers 25 Password Recovery Attacks in Major Cloud Password Managers
Fake CAPTCHA Scam Tricks Windows Users Into Installing Malware
Eurail says stolen traveler data now up for sale on dark web
Washington Hotel in Japan discloses ransomware infection incident
Dolphin Emulator hits a breakthrough with TriForce arcade support
1.5 Million AI Agents At Risk As Firms Deploy Faster Than Security Can Keep Up
Microsoft Finds “Summarize with AI” Prompts Manipulating Chatbot Recommendations
Gentoo dumps GitHub over Copilot nagware
Apple introduces a new video podcast experience on Apple Podcasts
The 14th Anniversary of Our Foundation
Keenadu Firmware Backdoor Infects Android Tablets via Signed OTA Updates
Microsoft Teams outage affects users in United States, Europe
Notepad++ boosts update security with ‘double-lock’ mechanism
Making music with MIDI just got a real boost in Windows 11
Month-Long Sale Event Starts Next Week!
This LEGO alarm clock is as loud as a rocket launch
Levelling up with Python: Create with data
The Complicated Legacy Of Mind Controlled Toys
Watch This Backpack Automatically Deploy an Umbrella in the Rain
Used Equipment Sale – Whangarei Amateur Radio Club
Honolulu Department of Emergency Management is Recruiting: Volunteer Amateur Radio Operators
Zero Retries Digital Conference 2026 Announced
Today's lead story I take a deep dive into Meta’s controversial return to facial recognition technology. After publicly abandoning its face-tagging systems years ago following billions of dollars in legal settlements, the company is now integrating real-time identification directly into its popular Ray-Ban smart glasses. We break down the leaked internal documents that reveal a project called "Name Tag," a system designed to let wearers identify strangers on the street by tapping into Meta’s massive social database. We also explore the unsettling strategy behind the launch, which suggests Meta intentionally timed this rollout to coincide with a period of high political distraction to avoid the scrutiny of privacy watchdogs.
Beyond the headlines, we examine the technical and social fallout of a world without public anonymity. From "super-sensing" hardware that records continuously to the cottage industry of hackers teaching people how to disable built-in privacy lights, the landscape of personal privacy is shifting rapidly. We look at the legal battles brewing in states with strict biometric laws and the ethical crossroads facing the engineers building these tools. This story isn't just about a new gadget; it’s about a calculated push to change how we interact in public spaces and whether the convenience of an AI assistant is worth the permanent end of being a face in the crowd.
Welcome to the Crystal Carrier Wave, on today's show I discuss a landmark digital forensics case where Google successfully recovered deleted Nest footage to aid an abduction investigation, sparking a massive debate over how long our "wiped" cloud data actually lives on remote servers. I dive into the latest critical security patches from Microsoft and Apple, including an urgent fix for an exploited zero-day vulnerability that left nearly every iPhone and Mac at risk. We look at the escalating AI arms race as Google flags state-sponsored abuse of its Gemini platform by global hackers, while simultaneously exploring new survey data suggesting the average smartphone user is actually quite indifferent to these hyped-up AI features.
The broadcast continues with a report on Russia’s aggressive communication blockade against WhatsApp and Telegram and the surprising reality that the world’s leading open-source companies still rely heavily on Microsoft and Google for their own internal collaboration. In the realm of entertainment and retail, I cover Roku’s shift toward streaming bundles to find profitability and a sensitive data breach at the adult product manufacturer Tenga. We also examine why top-tier talent is fleeing OpenAI and xAI and how fake job recruiters are now hiding malware inside coding challenges.
Turning to the workshop, I discuss Bambu Lab’s decision to retire the P1P 3D printer while offering an impressive decade-long commitment to spare parts. We celebrate the latest release candidate of CircuitPython 10.1.0 and a thriving European chip industry that is currently seeing unprecedented stability. For the builders, I highlight a clever Arduino-powered turntable designed to achieve professional-grade 3D scans on a budget.
Finally, for the radio enthusiasts, I highlight the new HB9RG Trophy celebrating the pioneers of satellite communication and the opening of nominations for the 2026 Amateur Radio Software Award. We check out the latest digital tools from SpottedHam.com, some welcome news regarding FCC reporting exemptions for Ham operators, and a technical deep dive into the unique RF environment found at the very top of broadcast towers.
Meta Plans to Add Facial Recognition Technology to Its Smart Glasses
Meta Wants to Scan Every Face You Walk Past
Google recovers "deleted" Nest video in high-profile abduction case
Microsoft Patches Windows Flaw Causing VPN Disruptions
Apple Fixes Exploited Zero-Day Affecting iOS, macOS, and Other Devices
Google Flags Gemini Abuse By China, Iran, North Korea And Russia
New survey shows you really don't care about AI features on your phone
Russia tries to block WhatsApp, Telegram in communication blockade
SUSE, Red Hat And Canonical Rely On Microsoft And Google For Internal Collaboration
Roku to launch streaming bundles as part of its efforts to continue growing its profitability
The foundations of software: open source libraries and their maintainers
Sex toys maker Tenga says hacker stole customer information
Why top talent is walking away from OpenAI and xAI
Fake job recruiters hide malware in developer coding challenges
Viral AI Caricatures Highlight Shadow AI Dangers
Microsoft Discloses DNS-Based ClickFix Attack Using Nslookup for Malware Staging
Bambu Lab Bids Farewell to the P1P, Ceases Production — But Pledges Parts Availability Out to 2031
CircuitPython 10.1.0 Release Candidate 1 Released!
European Chip Industry Has Never Been Healthier
Building the ultimate turntable for 3D scanning
HB9RG Trophy Celebrates First Amateur Radio Contact via Satellite
Amateur Radio Software Award Nominations Open
SpottedHam.com Adds DX Cluster Integration and Customizable Club Widgets
FCC Expected to Exempt Amateur Radio Operators from Foreign Adversary Reporting Requirements
What Can You Hear From the Top of a Tower?
In today’s episode of the Crystal Carrier Wave, we explore the end of the ad-free era for conversational AI as OpenAI begins integrating sponsored content into ChatGPT for both free and premium users. We also dive into a massive week for tech news, including Cisco’s new 102.4T networking silicon, Microsoft’s latest security "nagging" in Windows 11, and a series of critical zero-day vulnerabilities affecting government and enterprise systems. From the transition to driverless printing to the arrival of the KiwiSDR 2, we cover the essential updates across the electronics, maker, and amateur radio landscapes.
The global financial landscape is currently being reshaped by a massive surge of capital directed toward the integration of artificial intelligence into the physical and digital foundations of society. National governments and private enterprises alike are moving beyond theoretical software, committing billions to "applied AI" that promises to address long-standing human challenges such as labor shortages, economic stagnation, and environmental resilience. From New Zealand’s 70-million-dollar investment into a national research platform to private sector funding for autonomous industrial systems, the narrative has shifted from speculative exploration to the deployment of technology as a fundamental productivity multiplier.
In the public sector, this movement is exemplified by initiatives like the New Zealand Institute for Advanced Technology, which is funding high-impact projects designed to move AI from the cloud into primary industries. These efforts focus on "physical AI," creating autonomous systems capable of navigating complex outdoor environments—from precision agriculture and aquaculture to aerospace and marine sectors. By backing projects like the Aotearoa Agentic AI Platform, which envisions millions of AI assistants augmenting human capability, leadership aims to secure national resilience and realize substantial GDP growth through 2038, centering the technology as a tool for a fairer and wealthier society.
The private sector is mirroring this aggressive push through high-stakes branding and industrial automation. Major investments, such as Crypto.com’s 70-million-dollar acquisition of the "AI.com" domain and the 40-million-dollar funding for Gather AI’s "curious" warehouse drones, signal a land grab for the infrastructure of the future. Investors are increasingly prioritizing "embodied AI" that can interact with the physical world to improve safety and efficiency in logistics and manufacturing. Together, these trends illustrate a global consensus: the significant wealth being poured into AI is no longer just about innovation for its own sake, but about building a permanent, intelligence-driven operating system for the betterment of human industry and daily life.
Welcome to the Crystal Carrier Wave, on today's show I discuss a major leap for open-source productivity with the launch of LibreOffice 26.2 and how Microsoft is turning SQL Server 2025 into an AI powerhouse on Ubuntu. We dive into the high-stakes world of cybersecurity as Microsoft develops a new scanner to hunt for hidden backdoors in AI models while researchers document an alarming eight-minute cloud breach assisted by artificial intelligence. I look at the changing landscape of digital media where listeners are now having to learn how to spot AI-generated music on Spotify and Microsoft is giving Copilot agents the keys to your OneDrive files. In social media news, TikTok is facing heavy pressure from the EU over addictive design features, while Adobe has been forced by user demand to save its thirty-year-old animation software from the chopping block.
We then move to talk about the hardware world with Google hinting at a massive cross-platform sharing expansion for Android and a critical security update for Chrome that you need to install right now. We explore the future of education through a new Raspberry Pi study on AI in the classroom and look at Toyota's surprising move into open-source game engines for its newest car cockpits. The technical deep dive continues with a look at the TeamPCP worm threatening cloud infrastructure and the new, stricter age verification measures coming to Discord.
For the makers and radio enthusiasts, I cover essential two-layer PCB routing strategies and the big features landing in the latest Home Assistant release. We celebrate the global maker community with the announcement of Arduino Days 2026 and the latest tools from the Arduino App Lab, followed by the massive news of Texas Instruments acquiring Silicon Labs. Finally, we look at the incredible feat of building a Nintendo Entertainment System on a breadboard before heading to the airwaves to celebrate the Polish Amateur Radio Union’s centennial event and the upcoming Jock White Memorial Field Day in New Zealand.
Crypto.com places $70M bet on AI.com domain ahead of Super Bowl
Gather AI, maker of ‘curious’ warehouse drones, lands $40M led by Keith Block’s firm
LibreOffice 26.2 is here: a faster, more polished office suite that you control
AI meets SQL Server 2025 on Ubuntu
Microsoft Develops Scanner to Detect Backdoors in Open-Weight Large Language Models
AWS intruder pulled off AI-assisted cloud break-in in 8 mins
Here's how to spot AI-generated music on Spotify
Microsoft sets Copilot agents loose on your OneDrive files
EU says TikTok faces large fine over "addictive design"
User blowback convinces Adobe to keep supporting 30-year-old 2D animation app
Google hints at big AirDrop expansion for Android "very soon"
Chrome Vulnerabilities Allow Code Execution, Browser Crashes
Join our new study on AI and data-driven computing in UK primary classrooms
Toyota Builds Open Source Fluorite Engine To Power Console-Grade Car Cockpits
TeamPCP Worm Exploits Cloud Infrastructure to Build Criminal Infrastructure
If YouTube’s age verification frustrated you, Discord has bad news
PCB Friday: Two-Layer PCB Routing Strategies and Tips
Home Assistant 2026.2 Brings the New Home Dashboard, Quick Search, New Integrations, and More
Save the date: Arduino Days 2026 is coming!
Introducing the latest Arduino App Lab release
TI to pay $7.5B cash for Silicon Labs
Build Your Own Breadboard NES
STMicroelectronics expands strategic engagement with Amazon Web Services to enable new high performance compute infrastructure for cloud and AI data centers
Polish Amateur Radio Union Celebrates Gdynia 100th Anniversary
VHF and Above Contests
Jock White Memorial Field Day
A sophisticated supply chain attack is currently targeting the macOS developer community through the Open VSX Registry, an open-source alternative to the Microsoft Visual Studio Marketplace. Attackers are leveraging the platform's vendor-neutral nature to distribute malicious extensions that masquerade as legitimate development utilities. These tools use a "shimmer" technique to perform expected functions while secretly executing background scripts that establish system persistence and exfiltrate highly sensitive data, including keychain information, browser cookies, and SSH keys.
To combat this threat, the Eclipse Foundation has implemented a significant security overhaul, mandating automated pre-publish scans for all submissions to detect malware signatures and suspicious code patterns. Additionally, the introduction of a verified publisher system aims to replace anonymous contributions with a "web of trust" by linking accounts to reputable developer profiles. Security experts now urge macOS users to audit their existing extensions and move toward pinned versions in development environments to prevent automated updates from introducing compromised code.
Welcome to the Crystal Carrier Wave, on today's show I discuss a massive security breach at the heart of the developer community where the Notepad++ update mechanism was hijacked to deliver targeted malware. We follow this with a deepening crisis in healthcare data security as a major provider reports that over 700,000 patients have now been impacted by a single breach. In the browser wars, Mozilla is taking a stand for privacy by making its new AI features strictly opt-in, while the FFmpeg project is drawing a hard line in the sand by rejecting AI-generated code patches to protect software integrity.
Moving into the world of big tech, Google Messages is finally bringing back a much-requested edit history feature, while Microsoft has been busy patching a strange bug that caused password sign-in options to vanish entirely. Windows 11 users are also navigating a desktop-breaking glitch that requires some manual intervention to fix. On the security front, Russian state-sponsored hackers are already exploiting a recently patched Office bug, reminding us all why immediate updates are critical.
In hardware news, Intel has launched the high-performance Xeon 600 series for workstations, while Adobe is officially saying goodbye to Animate as they pivot their entire strategy toward generative AI. Microsoft is also trimming its cloud portfolio by ending several standalone SharePoint and OneDrive plans. For the Linux enthusiasts, the KDE project has made a controversial decision to bind itself exclusively to systemd, and OpenAI is preparing users for the retirement of the GPT-4o model on February 13th. We also look at a US investigation into Meta’s encryption claims and the growing global backlash against the flood of AI-generated slop on social media.
For the makers and electronics hobbyists, we dive into the technical feat of defeating a 40-year-old copy protection dongle and the nostalgic beauty of using a 128-byte core memory module as a modern flash drive. Microchip is expanding its reach into automotive displays with new touchscreen ICs, and STMicroelectronics is consolidating its lead in the sensor market by acquiring NXP’s MEMS business. We also take a look at a massive, super-sized Arduino Uno and the new community-driven device database from Home Assistant, plus a $20,000 hacking challenge from Raspberry Pi that just became a little easier to enter.
Finally, in our amateur radio and LPFM segment, we highlight a vital new CHIRP file for Florida’s SARnet operators and a community effort to keep the HamClock backend alive after the passing of its creator. We wrap up with the fun news that the real WKRP is willing to share its legendary call sign with other stations to help fund the next generation of non-profit community radio.
Dangerous new malware targets macOS devices via OpenVSX extensions - here's how to stay safe
Eclipse Foundation Mandates Pre-Publish Security Checks for Open VSX Extensions
Notepad++ Official Update Mechanism Hijacked to Deliver Malware to Select Users
Major health provider data breach may have affected thousands more people - over 700k now thought to have been hit
Firefox Goes Opt-In AI As Mozilla Pushes Open Source Alternative To Big Tech
FFmpeg Enforces Human Review Standards, Pushes Back On AMD’s AI-Style Patch
Google Messages could soon bring back a crucial feature that was quietly removed
Microsoft fixes bug causing password sign-in option to disappear
Windows 11 bug breaks the entire desktop for some users — but luckily there's a fix
Russian hackers exploit recently patched Microsoft Office bug in attacks
Intel Launches new Intel® Xeon® 600 Processors for Workstation
Adobe Animate is shutting down as company focuses on AI
Microsoft ends some standalone SharePoint and OneDrive plans
KDE Binds Itself Tightly To Systemd, Drops Support For Non-Systemd Systems
ChatGPT-4o is going away on February 13 — here are 5 ways you can survive the upcoming 4o-pocalypse
US authorities reportedly investigate claims that Meta can read encrypted WhatsApp messages
AI 'slop' is transforming social media - and there's a backlash
U.S tech backlash grows as countries and startups seek alternatives
Defeating a 40-year-old copy protection dongle
A 128 byte core memory module as a flash drive
Microchip Intros Touchscreen ICs for Broader Automotive Display Size Ranges
STMicroelectronics expands sensors capabilities with closing of acquisition of NXP’s MEMS business
There's nothing micro about this super-sized Arduino Uno
Home Assistant Opens Contributions for the Open Home Foundation Device Database
Raspberry Pi Relaxes the Rules for Its RP2040 Hacking Challenge, $20,000 Still Up for Grabs
The Best CHIRP File for SARnet
open-hamclock-backend Aims to Keep HamClock Ticking
WKRP (a Real One) Is Willing to Share Its Call Sign
In today's feature story, we highlight how the Southland Geeks have successfully bridged the gap between niche hobbies and community service. By organizing "Geek Out For Good," the region’s first dedicated nerd convention, the group transformed a shared love for collectibles, comics, and gaming into a platform for philanthropy. The event drew hundreds of local residents, proving that the vibrant maker and collector culture in Southland is not only growing but is deeply committed to supporting the social fabric of the province.
The initiative culminated in a significant donation to the Southland branch of the Mental Health Foundation, with proceeds specifically directed toward fostering local wellbeing and advocacy. For the organizers, the choice of charity was deeply personal; they recognize that the social connection found in these hobbyist communities—whether through tabletop gaming or tech collaboration—serves as a vital pillar for mental health. By keeping the funds within Southland, the group ensures that the resources stay exactly where they are needed most, supporting the friends and neighbors who make up their unique community.
This milestone marks the evolution of the Southland Geeks from a casual interest group into a formidable community organization capable of tangible impact. Their success serves as a powerful blueprint for other local groups, showing how passion projects can be leveraged to address urgent social needs. As they look toward future gatherings and even larger conventions, the Southland Geeks have made it clear that while they may be focused on the technology and games of the future, their hearts remain firmly rooted in the wellbeing of their local community today. [Source: What's on Invers]
Welcome to the Crystal Carrier Wave, on this episode I discuss the Southern Institute of Technology's forward-thinking move to launch a new AI-focused degree in Southland while Microsoft reports massive cloud growth driven by its own AI investments. We look at the darker side of development with a warning about fake AI coding assistants on the VS Code marketplace and a sophisticated cyberattack on the Polish power grid linked to Russia-aligned threat actors. The hardware world is buzzing with the release of AMD’s powerful Ryzen 9850X3D, though its high performance comes with a serious appetite for power, while Oracle considers workforce restructuring to keep its massive AI data center goals on track.
The conversation moves to education and consumer rights as we explore proposals for new AI qualifications in England and Google's multi-million dollar settlement over unauthorized data harvesting on Android. We also dive into the technical frustrations of YouTube blocking background play on third-party browsers and a peculiar glitch where Gemini AI begins talking to itself on Android Auto. Despite ongoing criticism, Windows 11 has officially crossed the one-billion-user threshold, and Amazon is stepping up with new free generative AI courses for professionals, while Fitbit users find themselves on a final countdown to migrate their accounts to Google.
In our electronics and maker segment, we take a trip back to 1979 to revisit RadioShack's primitive AI therapist and analyze the boot-up nuances of the new Arduino Uno Q. We celebrate pure creativity with a Nintendo Switch controller made of LEGO and a project that finally brings GPIO pins to the standard desktop PC, though we also cover a sobering revelation about the ease of "phreaking" atomic clock radio signals. Finally, in the amateur radio world, we honor the legacy of the HamClock creator as the project prepares to sunset, announce a massive $25,000 student coding prize from the ARRL, and celebrate nearly a century of Brazilian amateur radio with a satellite-based SSTV event. We wrap up with a call for new voices at the GB2RS news service and a warning from LPFM advocates about the dangers of media consolidation on our local airwaves.
SIT Launches New AI-Focused IT Degree
Microsoft earnings press release available on Investor Relations website
Fake Moltbot AI Coding Assistant on VS Code Marketplace Drops Malware
Russia-Aligned ELECTRUM Tied to December 2025 Cyber Attack on Polish Power Grid
Ryzen 9850X3D review: AMD's bragging-rights gaming CPU gets more to brag about
Oracle may slash jobs to keep AI datacenter plans on track
A new qualification in data science and AI for students in England?
YouTube may be blocking background play on third-party browsers (Update: Google confirms)
Google settles class action over 'appropriating' cell data on Android
Gemini can't stop talking to itself on Android Auto
People complaining about Windows 11 hasn't stopped it from hitting 1 billion users
AWS Unveils Generative AI Essentials Course
Fitbit users have been given more time to migrate their accounts over to Google
RadioShack Sold You an “AI” Therapist in 1979
Arduino Uno Q: The Truth About its Boot-Up Performance
This Switch Controller Is Made of LEGOs
Give Your Desktop GPIO Pins
You Can Phreak Atomic Clocks
HamClock Project to Sunset June 2026
Student Coding Competition is Underway with $25,000 Award
LABRE Celebrates 92 Years with SSTV Event
GB2RS newsreaders wanted
LPFM Advocate Warns FCC of Possible Side Effects of More Consolidation
A critical vulnerability in the GNU InetUtils telnet daemon has surfaced, leaving an estimated 800,000 servers worldwide open to a trivial remote authentication bypass. The flaw, tracked as CVE-2026-24061, allows an attacker to gain full root-level access without a password by simply supplying a crafted "USER" environment variable during the login process. By passing the string "-f root", the daemon is tricked into invoking the system login process with a flag that skips all security checks.
The scale of the exposure is particularly alarming because, while Telnet is considered an obsolete and insecure protocol, it remains deeply embedded in legacy infrastructure, industrial control systems, and Internet of Things devices. Data from the Shadowserver Foundation and Censys shows that the highest concentrations of these vulnerable systems are in China and Brazil, followed by the United States and Japan. Because many of these devices are no longer supported by their manufacturers, they may never receive the necessary firmware updates.
The risk is not theoretical; cybersecurity firms like GreyNoise have already detected active exploitation attempts in the wild, with some honeypots being compromised in under an hour. Attackers are currently using the flaw to deploy Python-based malware, establish persistence via SSH keys, and conduct reconnaissance for lateral movement within networks. Organizations are urged to immediately update to GNU InetUtils version 2.8, or, if patching is not an option, to disable Telnet entirely and migrate to the encrypted SSH protocol.
Welcome to episode 36 of the Crystal Carrier Wave, on today's show I discuss a critical emergency patch from Microsoft for an Office zero-day vulnerability that is seeing active exploitation in the wild, while Google introduces a new feature to remind Gemini users to take a break from their AI assistants.
I look into the shadowy PeckBirdy framework used by China-linked hackers and a simple command error that temporarily knocked NASA’s TESS satellite offline. Apple has set a new record for longevity by updating the twelve-year-old iPhone 5S, contrasting sharply with a ruling in Austria that found Microsoft illegally tracked students through educational software.
The security world is reeling from a massive SoundCloud data breach affecting nearly thirty million users and a staggering 1.4 terabyte data theft at Nike, all while TikTok users flee to privacy-first apps as the platform faces a new US venture crisis.
I explore the Linux kernel’s new continuity plan for a post-Linus era and France’s decision to ban US videoconferencing tools in favor of national sovereignty. In hardware news, AMD is looking to bundle CPUs with RAM to fight rising prices, over six thousand SmarterMail servers face hijacking risks, and we question the nature of trust in AI-generated search results.
I also cover the persistent threat of WinRAR flaws and Google’s latest aggressive theft protections for Android. Moving into the maker space, we review the larger Prusa Core One L and a brilliant project turning a shoebox into an autonomous robot.
There is major aerospace news with a new European FPGA for space missions, and we look at the technical wizardry of running Arduino code on bare-metal hardware or converting a Commodore 64 keyboard for USB use without damaging the original casing.
I discuss why audiophiles are finding Raspberry Pi units inside multi-thousand dollar streamers and how one clever maker converted vintage telephone lines into a gigabit home network.
Finally, I wrap up with a look at growing IoT interest in professional kitchens, new development tools for Renesas microcontrollers, upcoming funding opportunities for hams through the ARDC, and a technical deep dive into the engineering history of PAL and NTSC video standards.
Become a supporter of the podcast and help me grow the podcast and studio by becoming an Insider, every little bit helps and is greatly appreciated.
If you have anything you’d like to share or comment on, email podcast .at. zl4kj .dot. nz, I would love to hear from you. Alternatively you can Send a Voice Message
Microsoft Office Zero-Day (CVE-2026-21509) - Emergency Patch Issued for Active Exploitation
Love Gemini? Google doesn't want you to get too attached
China-Linked Hackers Have Used the PeckBirdy JavaScript C2 Framework Since 2023
NASA confirms TESS temporarily felled by command error
Apple once again puts Android to shame – it just updated the 12-year-old iPhone 5S to set a new record
Ruling: Microsoft illegally placed cookies on child's tech
Have I Been Pwned: SoundCloud data breach impacts 29.8 million accounts
Nike investigating mega security breach as hackers claim to have stolen 1.4TB of data
TikTok’s new US venture is in trouble – here are the 3 privacy-first apps people are flocking to instead
Linux kernel gets continuity plan for post-Linus era
France says au revoir to US videoconferencing software
AMD could be working on a way to minimize RAM price hike pain — by bundling Ryzen CPUs and DDR5 memory
Over 6,000 SmarterMail servers exposed to automated hijacking attacks
Trust In AI Search Results
WinRAR path traversal flaw still exploited by numerous hackers
Google just made it even harder for thieves to access your Android device
3D Printer Review: Prusa Core One L — Bigger and Better
From Shoe Box to Smart Robot: A Maker’s Journey to Autonomy
NanoXplore and STMicroelectronics deliver European FPGA for space missions
An Arduino Without the Arduino?
No Commodores Were Harmed in the Making of This USB Keyboard
Audiophiles keep finding Raspberry Pi inside Hi-Fi streamers selling for thousands
Clever Brit successfully repurposes telephone wiring for gigabit internet throughout his vintage home — Lad converts "incomprehensible mess of wires" into high-speed ethernet links
Growing IoT interest for restaurant operations - MachineQ survey
Mikroe to provide development tools for Renesas MCUs
ARDC Priority Areas of Funding Offer Opportunities for Hams
How Do PAL and NTSC Really Work?
The lead story for this episode dives into the high-stakes evolution of the cybersecurity landscape as we move through 2026, focusing on the transition from human-led attacks to a new era of fully automated, AI-driven campaigns. We explore how traditional defense mechanisms like signature-based detection have become largely ineffective against polymorphic code that can rewrite itself in real-time, effectively making every intrusion attempt a zero-day event. The discussion covers the alarming sophistication of modern social engineering, where AI agents can now mimic the specific linguistic styles of corporate executives and use deepfake audio to bypass even the most seasoned employees.
The core of our analysis centers on why a reactive security posture is no longer viable and how organizations are pivoting toward an identity-first defensive strategy. We break down the shift to continuous authentication and behavioral biometrics, which look beyond simple passwords to monitor the unique, micro-level patterns of how a user interacts with their system. By integrating artificial intelligence into the heart of the defense—using it to predict anomalies and isolate threats in milliseconds—security teams are finally finding a way to counter the machine-speed velocity of modern hackers. We also touch on the changing role of the human analyst, moving from a manual defender to a strategic architect who manages these complex, symbiotic systems. This segment serves as a blueprint for resilience, emphasizing that winning this war requires a combination of Zero Trust architecture, collective threat intelligence sharing, and a fundamental rethink of what it means to trust a digital identity in an age of total automation.
Welcome to episode 35 of the Crystal Carrier Wave, also on this episode I discuss the escalating arms race between artificial intelligence and human editors on Wikipedia, where new Claude-based plugins are now helping automated content evade detection by scrubbing away common linguistic tells. This tension between technology and user autonomy continues as we look at why privacy advocates are doubling down on local Windows 11 accounts for 2026 and examine a strange bug causing audio leaks during Pixel voicemails. We also explore the forensic possibilities of Android 16’s new intrusion logging, the high human cost of Autodesk’s pivot toward the cloud, and the mixed financial signals coming from Intel as it pushes further into the foundry business.
The conversation shifts toward the practical realities of modern software development, questioning whether AI assistants are truly streamlining code or just creating a mountain of technical debt, a frustration echoed by the CURL project as they move to drop bug bounties to escape an influx of AI-generated slop. On the security front, we cover the latest ShinyHunters breach of Okta customers, a sophisticated phishing campaign targeting Russia, and the emergency updates Microsoft had to rush out to fix freezing Outlook clients. We also highlight proactive defenses like 1Password’s new phishing alerts and the chaotic moment Gmail’s spam filters went haywire, alongside the arrival of Apple’s next-generation AirTags and the hidden dangers lurking in malicious VSCode extensions.
For the builders and experimenters, I dive into some clever hardware solutions, including a 3D-printed brace that brings RFID readers into the LEGO ecosystem and a stunning piece of wall art that visualizes the invisible ambient radio waves in our homes. We also review the Snapmaker U1 to see if it lives up to its heavy-duty reputation in the workshop. Finally, we honor the roots of communication by exploring the history of Morse code in resistance movements, catch up on the latest orbital telemetry from AMSAT, and look forward to the centennial celebration of World Thinking Day on the airwaves as the RSGB hunts for new leadership to guide the next generation of technical talent.
Become a supporter of the podcast and help me grow the podcast and studio by becoming an Insider, every little bit helps and is greatly appreciated.
If you have anything you’d like to share or comment on, email podcast .at. zl4kj .dot. nz, I would love to hear from you. Alternatively you can Send a Voice Message
Winning Against AI-Based Attacks Requires a Combined Defensive Approach
Claude Plugin Turns Wikipedia’s AI Tells Into Evasion Tools
Don't Use a Microsoft Account on Windows 11 (2026)
Weird bug on Pixel's Phone app might be leaking your audio during voicemails
Android’s new feature lets you see what happened after a break-in
Intel Reports Fourth-Quarter and Full-Year 2025 Financial Results
Autodesk burns the village to feed AI and the Cloud – cuts 7% of workforce
Are AI Tools Making Software Development Easier?
Microsoft's shift to cloud management sw brings concerns
ShinyHunters claims Okta customer breaches, leaks data
Multi-Stage Phishing Campaign Targets Russia with Amnesia RAT and Ransomware
Microsoft releases emergency OOB update to fix Outlook freezes
1Password adds pop-up warnings for suspected phishing sites
Gmail issues saw it go a little haywire and start accusing user inboxes of being spam - here's what we know
The CURL Project Drops Bug Bounties Due To AI Slop
Apple introduces new AirTag with expanded range and improved findability
Malicious Microsoft VSCode AI extensions might have hit over 1.5 million users
RFID MFRC522 Reader LEGO brace by Jove
This Wall Art Displays Ambient Radio Waves
Review: Snapmaker U1 Strikes Hard
The Morse Code of Resistance
ANS-025 AMSAT News Service Weekly Bulletins
How will you be celebrating 100 years of World Thinking Day?
Honorary Skills and Career Development Officer wanted
The cybersecurity community is currently navigating an urgent crisis following a major advisory from CERT/CC regarding a catastrophic vulnerability in a foundational binary parsing library. Assigned the highest possible CVSS severity score of 10.0, this flaw targets the "gatekeeper" logic responsible for translating raw machine-readable data into the structured information used by applications. Because these parsers are embedded in a massive variety of systems—ranging from industrial control units and enterprise software to medical devices and automotive telematics—the vulnerability represents a significant threat to the global software supply chain.
At its technical core, the vulnerability stems from an integer overflow during memory allocation. By sending a specially crafted binary file, an attacker can trigger a heap-based buffer overflow, enabling unauthenticated remote code execution. Because these parsers often run with high-level system privileges and require no user interaction to trigger, an exploit grants an attacker total control over the target machine. The widespread integration of this open-source code over the last decade means that while a primary patch is available, securing millions of disparate "long-tail" endpoints will likely take years.
In response to the threat, enterprise IT teams are being urged to immediately inventory their software environments and isolate vulnerable systems. The situation has also reignited a critical industry debate regarding the adoption of memory-safe programming languages like Rust and Zig, which are designed to prevent this class of memory-related errors at the architectural level. With reports of state-sponsored actors already scanning for unpatched targets, the incident underscores the ongoing fragility of modern digital infrastructure and the high stakes of securing the foundations of the digital economy.
Welcome to Episode 34 of the Crystal Carrier Wave, this episode begins with a look at the changing face of mobile technology as Asus makes the surprising announcement that its smartphone business is entering an indefinite hiatus. While we lose those compact Zenfones, Realme is moving in the opposite direction by launching a device with a massive ten thousand milliamp-hour battery designed for ultimate endurance. The security landscape is also shifting rapidly, with the discovery of VoidLink, a new cloud malware that shows clear evidence of being generated by artificial intelligence. We also dive into the UK government's latest warnings regarding Russian hacktivist groups and a critical security flaw in Google Gemini that exploited calendar invites to compromise private data. From the EU's push for digital sovereignty to the closure of early alternative app stores, the regulatory environment is proving just as volatile as the technology itself.
The conversation moves to the workbench and beyond as we explore the literal frontiers of electronics. Researchers are now looking at the Moon as a potential site for semiconductor fabrication, utilizing the lunar vacuum to build the next generation of hardware. Back on Earth, the maker community continues to impress with a fully functional four-stroke engine created through 3D printing and the release of the Arduino UNO Q, which packs a staggering four gigabytes of RAM into a familiar footprint. We also take a look at the Orbigator, an analog device for calculating orbits, and get some professional prototyping advice from the world of BattleBots. Whether it is retro-style Nixie tube gear indicators or modular storage for the workshop, this week proves that the DIY spirit is more sophisticated than ever.
In the world of amateur radio and broadcasting, the focus this week is on accessibility and community standards. A new comedy podcast is tackling the long-standing issue of gatekeeping within the ham radio hobby, using humor to make the technical world more inviting for newcomers. For the hunters in the field, SpottedHam has launched a new automated alert system to make tracking Parks on the Air activations easier than ever. Meanwhile, the FCC is reinforcing its commitment to local voices by dismissing LPFM applications that failed to meet strict residency and community-link requirements. We finish with a look at new portable isolation booths from Isovox that are helping broadcasters achieve studio-quality audio from almost any location, ensuring that local radio remains professional and clear regardless of the environment.
Become a supporter of the podcast and help me grow the podcast and studio by becoming an Insider, every little bit helps and is greatly appreciated.
If you have anything you’d like to share or comment on, email podcast .at. zl4kj .dot. nz, I would love to hear from you. Alternatively you can Send a Voice Message
Asus confirms its smartphone business is on indefinite hiatus
UK Watchdog Flags Meta for Hosting Ads Linked to Illegal Gambling
realme goes all-in on battery life with a 10,001mAh phone
Helicopter drone for Royal Navy makes first autonomous fligh
Warwickshire school to reopen after cyberattack crippled IT
UK govt. warns about ongoing Russian hacktivist group attacks
Google Clock just made it harder to sleep through your alarms
A Google Gemini security flaw let hackers use calendar invites to steal private data
VoidLink cloud malware shows clear signs of being AI-generated
ACF plugin bug gives hackers admin on 50,000 WordPress sites
In an effort to protect young users, ChatGPT will now predict how old you are
Google temporarily disabled YouTube's advanced captions without warning
EU plans cybersecurity overhaul to block foreign high-risk suppliers
One of the first alternative app stores in the EU is shutting down
IoT: Helping To Transform Healthcare
Manufacturing electronics on the moon
This 3D-Printed Four-Stroke Engine Actually Runs
Yet Another Flipper Zero Competitor
Nixie Gear Indicator Shines Bright
From Sketch to Success: Prototyping Secrets with a BattleBots Designer
Grit Stash: Sandpaper Storage
Orbigator – an analog orbit propagator
Arduino UNO Q is now available with 4GB RAM and 32GB storage!
New Comedy Podcast Tackles Ham Radio's "Gatekeeping Problem" With Humor and Education
SpottedHam.com Launches Custom POTA and Keyword Email Alerts
FCC Dismisses LPFM Applications Citing Localism Rules
Isovox to Introduce Portable Sound Isolation Booth
On January 20th, 2026, One New Zealand marks a significant technological milestone by beginning the phased retirement of its 3G network, with Dunedin serving as the inaugural city for the switch-off. First launched in 2005, 3G technology was once the backbone of the mobile internet revolution, but it has now been surpassed by faster, more efficient standards. Dunedin was strategically selected as the starting point for this decommissioning due to its robust existing 4G and 5G infrastructure, which ensures that the vast majority of local residents will transition to modern signals without a loss in service quality.
The decision to retire the legacy network is driven by the need to repurpose the 900-megahertz spectrum currently occupied by 3G. By clearing these older "lanes" of the digital highway, One NZ can reallocate the frequency to bolster the capacity and penetration of its 4G and 5G services, particularly for indoor environments and rural areas like Otago. With 3G traffic now accounting for less than one percent of the total data used on the network, the company views the maintenance of this aging hardware as an inefficient use of resources that are better served by high-speed, modern infrastructure.
Despite the benefits of the upgrade, the shutdown carries critical implications for users of older hardware and specialized equipment. While 3G-only mobile phones are the most obvious devices affected, the transition also impacts early-generation 4G handsets that do not support Voice over LTE, or VoLTE. These specific devices rely on the 3G signal for voice calls even while using 4G for data, meaning they will lose all calling capabilities—including the ability to contact 111 emergency services—once the towers go dark. This safety concern extends to non-mobile hardware, such as older medical alarms, emergency pendants, and security systems that may be hardwired to 3G modems.
Beyond personal devices, the business community and agricultural sector must also navigate this transition. Many legacy IoT devices, including older EFTPOS terminals, vehicle GPS trackers, and remote soil sensors, may lack the necessary 4G fallback to continue functioning. As One NZ moves its shutdown program north across the rest of the country, and with Spark having already finished its transition and 2degrees following suit later this year, the era of 3G in New Zealand is officially drawing to a close. Users are encouraged to check for 4G or 5G icons on their devices and ensure VoLTE is enabled to remain connected in this new digital landscape.
Welcome to Episode 33 of the Crystal Carrier Wave, also on today's show I discuss the significant shift in the New Zealand retail landscape as EB Games prepares to close its physical storefronts by March 2026. This move highlights the increasing pressure from digital platforms and marks the end of an era for local high-street gaming. We also look at the streaming world, where Spotify is implementing its third price hike in less than three years, suggesting that frequent subscription adjustments are becoming the new standard for the industry.
In the world of AI, there is a rising tide of resistance as Games Workshop and Bandcamp both announce strict bans on AI-generated content to protect human creators. This comes alongside troubling research showing that even minor fine-tuning can break the safety guardrails of Large Language Models, making them unpredictable. We also dive into the "Reprompt" attack, a new vulnerability that allows attackers to exfiltrate data from Microsoft Copilot with a single click, proving that as these assistants get more personal with features like Google Gemini’s new memory upgrade, the security stakes are higher than ever.
Security takes center stage as we cover Microsoft’s legal move in the UK to dismantle the "bulletproof" host RedVDS and their successful disruption of a global fraud-as-a-service subscription model. Meanwhile, site administrators are on high alert due to an actively exploited flaw in the WordPress Modular DS plugin. We also break down the structural evasion tactics of Gootloader malware, which is now hiding inside 1,000-part ZIP archives to crash security scanners, and Cisco’s emergency patch for a zero-day vulnerability exploited by state-linked actors.
The hardware world is facing renewed chaos as the RAM shortage spills over into GPUs, SSDs, and even traditional hard drives, threatening to drive up prices through mid-2026. We look at why Raspberry Pi prices remain inflated despite high production and how to secure them at the official cost. On a brighter note, we explore the new pro-grade ESP32 smart home gateway and Adafruit’s motion-reactive "Sparkle Motion" boards, which are opening new doors for wearable tech and advanced home automation.
For the radio community, we analyze the upcoming 60-meter band expansion arriving this February and the FCC’s decision to exempt amateur operators from burdensome foreign adversary reporting. We also highlight the launch of VOACAP View for precision HF propagation and discuss why LPFM stations should prioritize dynamic range over pure loudness to prevent listener fatigue. Finally, we provide an update on the Public Radio Engineering Conference and Microsoft’s emergency fix for a Windows 11 bug that prevented devices from shutting down properly.
Become a supporter of the podcast and help me grow the podcast and studio by becoming an Insider, every little bit helps and is greatly appreciated.
If you have anything you’d like to share or comment on, email podcast .at. zl4kj .dot. nz, I would love to hear from you. Alternatively you can Send a Voice Message
EB Games Confirms It’s Game Over For New Zealand
Researchers find fine-tuning can misalign LLMs
Microsoft taps UK courts to dismantle cybercrime host RedVDS
Microsoft disrupts global cybercrime subscription service responsible for millions in fraud losses
Critical WordPress Modular DS Plugin Flaw Actively Exploited to Gain Admin Access
Researchers Reveal Reprompt Attack Allowing Single-Click Data Exfiltration From Microsoft Copilot
College Students now get 12 months of Microsoft 365 Premium and LinkedIn Premium Career on us
Spotify’s 3rd price hike in 2.5 years hints at potential new normal
AWS CodeBuild Misconfiguration Exposed GitHub Repos to Potential Supply Chain Attacks
Gootloader now uses 1,000-part ZIP archives for stealthy delivery
Cisco Patches Zero-Day RCE Exploited by China-Linked APT in Secure Email Gateways
TikTok to Roll Out Stronger Age Verification Across the EU
Grubhub says hackers stole company data in recent breach - here's what we know
RAM shortage chaos expands to GPUs, high-capacity SSDs, and even hard drives
Fun for Work: The Prompt: Use AI to hype you up
Gemini gets personal as Google rolls out a big memory upgrade
Why Are Raspberry Pis So Expensive? (+Tips to Get One Cheap)
Microsoft issues emergency fix after a security update left some Windows 11 devices unable to shut down
Warhammer Maker Games Workshop Bans Its Staff From Using AI in Its Content or Designs, Says None of Its Senior Managers Are Currently Excited About the Tech
Bandcamp becomes the first major music platform to ban AI content
Lead times growing with some lines on allocation
Coolest Projects 2026: Opens for entries in January!
A Pro-Grade Smart Home Gateway Powered by an ESP32
What to Make with Adafruit’s Sparkle Motion Boards
A Guide To Using Triacs For Switching AC
DXLook Introduces VOACAP View Professional HF Propagation Predictions
New 60-Meter Frequencies Available as of February 13
FCC Poised to Exempt Amateurs from Foreign Adversary Reporting Requirements
Take Care of Your Listener’s Ears
Registration Open for Public Radio Engineering Conference
The Prompt: Use AI to hype you up - Get an idea of what your boss thinks of you!
The cybersecurity landscape for the new year has kicked off with a significant administrative challenge as Microsoft released its January 2026 Patch Tuesday update, addressing a total of 114 security vulnerabilities. This massive rollout covers a diverse range of products, including the core Windows operating system, Azure cloud services, and developer tools like Visual Studio and .NET. Of particular concern to IT professionals are two zero-day exploits currently observed in the wild: a privilege escalation flaw in the Windows Kernel and a security feature bypass affecting Mark-of-the-Web. These vulnerabilities represent a high risk, as they allow attackers to elevate their system permissions or deliver malicious payloads without triggering standard operating system warnings.
The update also places a heavy emphasis on mitigating Remote Code Execution risks, with nearly thirty such patches included in this cycle. A standout fix involves the Windows Hyper-V environment, addressing a "guest-to-host" escape vulnerability that is particularly critical for enterprise and cloud providers. Furthermore, Microsoft continues to harden legacy components like the Windows Print Spooler and vital cloud management tools within the Azure ecosystem. As software complexity grows, compounded by the integration of AI-driven coding assistants—this initial update of the year underscores the ongoing necessity for rapid, prioritized patching of internet-facing systems and high-severity flaws to maintain a robust defensive posture.
In this episode of the Crystal Carrier Wave, I cover a wide range of tech and digital news. I start with the latest on the Manage My Health data breach, breaking down the timeline and what’s been uncovered so far. In Indonesia, PT Bussan Auto Finance and Pegadaian are recognized for their open source innovation at the Red Hat APAC Innovation Awards 2025. Google is making waves by introducing a universal shopping protocol, aiming to let AI handle purchases for you. Meanwhile, ChatGPT’s upcoming mobile UI changes might not sit well with power users.
I also highlight a quirky story about a rail ticket machine in Portugal still running on Windows 2000. In China, a new app called “Are You Dead?” is sparking conversations about the anxieties faced by young people living alone. Gmail is phasing out Gmailify and POP3, so users should prepare for some changes. Meta has removed over half a million teen accounts in Australia following a new ban.
There’s buzz about a leaked Windows 11 feature that brings Copilot into File Explorer, and Apple is choosing Google’s Gemini language models to power the next generation of Siri. In cybersecurity, a hacker has been sentenced for breaching the Rotterdam and Antwerp ports, and the EU is reframing open source as a strategic tool against U.S. tech dominance. Bill Gates warns that open source AI could pose bioterrorism risks.
On the creative front, Apple introduces Creator Studio, a new suite of creative apps. Ubisoft announces layoffs at Massive Entertainment and Ubisoft Stockholm amid restructuring. Thousands of n8n instances face a major security threat, and Windows 11 users get new cumulative updates. Adafruit is discontinuing the Teensy board, while Texas Instruments unveils a new SoC family to boost automotive AI. Farnell signs a deal with Fulham, and the CQ Amateur Radio Hall of Fame is seeking nominations. Finally, the FCC plans to fine four individuals for pirate radio activity around NYC.
Become a supporter of the podcast and help me grow the podcast and studio by becoming an Insider, every little bit helps and is greatly appreciated.
If you have anything you’d like to share or comment on, email podcast .at. zl4kj .dot. nz, I would love to hear from you. Alternatively you can Send a Voice Message
Manage My Health data breach: A timeline of what happened, and everything we know so far
Red Hat Celebrates PT Bussan Auto Finance and Pegadaian for Driving Open Source Excellence at the Red Hat APAC Innovation Awards 2025 for Indonesia
Google unveils a shopping standard so AI can buy things for you
Power users will not love this upcoming ChatGPT UI changeWindows 2000 running a rail ticket machine in Portugal
'Are You Dead?': New App Captures Anxieties of Young Chinese Living Alone
Gmail Says Goodbye to Gmailify and POP3: What Users Need to Know
Meta Removes 544K Teen Accounts Under Australia's Ban
Leaked Windows 11 Feature Shows Copilot Moving Into File Explorer
Apple chooses Google’s Gemini over OpenAI’s ChatGPT to power next-gen Siri
Hacker gets seven years for breaching Rotterdam and Antwerp ports
EU Reframes Open Source As A Strategic Weapon Against U.S. Tech Control
Bill Gates Warns Open Source AI Could Enable Bioterrorism Threats
Introducing Apple Creator Studio, an inspiring collection of creative apps
Ubisoft announces layoffs at The Division studio Massive Entertainment and Ubisoft Stockholm amid restructuring efforts
Thousands of n8n instances under threat from top security issue
Windows 11 KB5074109 & KB5073455 cumulative updates released
Discontinuing the Teensy at Adafruit
Texas Instruments Intros New SoC Family at CES to Scale Automotive AI
Farnell signs Fulham
CQ Amateur Radio Hall of Fame Seeks Nominations
FCC Plans to Fine Four for Pirate Activity Around NYC
The fallout surrounding the ManageMyHealth cyber breach has reached a critical turning point as the scale of the incident moves from theoretical privacy concerns to active financial threats. Regional data has begun to reveal the true depth of the compromise, with over 80,000 people in Northland alone now confirmed as impacted. This broad breach has shifted the conversation away from simple data access to a more predatory landscape where patients must now defend themselves against sophisticated identity theft and potential bank account fraud.
General practitioners remain on the front lines of this fallout, facing a surge of anxious patients without the necessary technical information to offer genuine reassurance. Because ManageMyHealth has yet to provide the granular, clinical-level detail requested by the Royal New Zealand College of General Practitioners, doctors are effectively operating in an information vacuum. This breakdown in communication has intensified the burden on local clinics, where staff are forced to manage high-stakes clinical uncertainty while the company’s corporate response remains guarded.
Cybersecurity advocates, including NetSafe, have escalated their warnings as the risk of spear-phishing becomes more immediate. Attackers may now possess enough personal detail—such as names, dates of birth, and clinic locations—to craft highly convincing fraudulent messages. This data also provides a toolkit for bypassing bank security protocols, leading to urgent advice for victims to monitor their financial statements with extreme scrutiny. The situation has moved beyond a technical failure, becoming a significant legal and financial event that has prompted closer oversight from the Office of the Privacy Commissioner.
As public and political criticism mounts over missed deadlines for briefings, the incident is exposing deeper systemic risks regarding New Zealand's reliance on third-party digital health vendors. The Public Service Association has highlighted this as a cautionary tale about the loss of internal IT expertise and the fragility of integrated health networks. While forensic investigations continue, the priority remains protecting the hundreds of thousands of New Zealanders now in the crosshairs of cybercriminals, as the sector waits for a full accounting of what was taken.
Welcome to episode 31 of the Crystal Carrier Wave, on today's show I talk about why CISA has issued an urgent warning regarding critical vulnerabilities in Microsoft Office and HPE OneView that are currently being exploited in the wild. Meanwhile, UK regulators are turning their attention to X after the Grok AI was used to generate explicit imagery from standard photographs. To combat rising security threats, Microsoft is set to enforce mandatory multi-factor authentication for all Microsoft 365 admin center sign-ins.
In the world of cybercrime, the Black Cat group has been identified as the force behind a sophisticated SEO poisoning campaign targeting users searching for popular software downloads. Across the globe, a new WhatsApp worm is spreading a banking trojan throughout Brazil using automated contact messaging. On the legal front, a man in Illinois has been charged following a federal investigation into hacked Snapchat accounts used to steal private content.
The intersection of AI and healthcare is also seeing major shifts as OpenAI launches its ChatGPT Health initiative while promising that sensitive medical data will not be used to train its general models. This follows Google’s decision to remove AI-generated overviews for certain medical queries to ensure accuracy. Despite some caution, Google is making its premium Gmail AI features free for all users, and OpenAI continues to expand by acquiring the team behind the executive coaching tool Convogo.
Hardware and infrastructure are seeing significant changes as Western Digital begins a major rebranding effort to move its WD Black and Blue SSDs under the SanDisk name. SpaceX has officially received approval to launch another 7,500 next-generation Starlink satellites to expand its global orbital network. In software news, adoption rates for iOS 26 are reportedly at an all-time low months after release, and Microsoft is reminding users that support for Windows 11 24H2 and Office 2021 will officially end in 2026.
Industry competition is intensifying as Red Hat and NVIDIA collaborate on rack-scale AI solutions, and the AI chip race sees new debuts from Intel, NVIDIA, and AMD. In a blow to legacy media, Microsoft’s classic Windows Media Player has officially stopped serving up metadata for CDs. On the design side, Apple has lost its lead Safari designer to the startup behind the Arc browser. However, there is good news for gamers as reports confirm a new Wolfenstein title is finally in active development.
For the maker and electronics community, hardware hackers have successfully demonstrated a USB-C upgrade for graphing calculators and the reverse-engineering of original Tamagotchi infrared protocols. We also see the rise of the EnderSpark project, which allows makers to convert broken 3D printers into high-precision EDM machines for metalworking.
In the amateur radio and broadcasting sector, Australian ham clubs are leading the way with a new enterprise-grade Yaesu IMRS repeater system. Terrestrial radio stations are navigating a new era of digital streaming standards, and a significant equipment donation to the Red Cross is set to improve emergency communications across the Arizona and New Mexico region. Finally, the ham community is gearing up for the YL POTA Party, and international operators should note the recent address change for the JARL QSL Bureau.
Become a supporter of the podcast and help me grow the podcast and studio by becoming an Insider, every little bit helps and is greatly appreciated.
If you have anything you’d like to share or comment on, email podcast .at. zl4kj .dot. nz, I would love to hear from you. Alternatively you can Send a Voice Message
CISA Flags Microsoft Office and HPE OneView Bugs as Actively Exploited
UK regulators swarm X after Grok generated nudes from photos
Microsoft to enforce MFA for Microsoft 365 admin center sign-ins
A new Wolfenstein game is in development according to multiple sources
Black Cat Behind SEO Poisoning Malware Campaign Targeting Popular Software Searches
OpenAI says ChatGPT won't use your health information to train its models
SanDisk heals WD Black and Blues, rebrands client SSDs
iOS 26 Shows Unusually Slow Adoption Months After Release
Microsoft to End Support for Windows 11 24H2, Office 2021, and More in 2026
Google just made Gmail’s best features free for everyone
Red Hat Expands Collaboration with NVIDIA to Pair Enterprise Open Source with Rack-Scale AI for Faster, Production-Ready Innovation
WhatsApp Worm Spreads Astaroth Banking Trojan Across Brazil via Contact Auto-Messaging
AI Chip Race Heats Up With Intel, Nvidia, and AMD’s CES Debuts
OpenAI to acquire the team behind executive coaching AI tool Convogo
ChatGPT Health wants access to sensitive medical records
Illinois man charged with hacking Snapchat accounts to steal nude photos
Microsoft Windows Media Player stops serving up CD info
Apple Loses Safari Lead Designer to The Browser Company - MacRumors
Google removes AI Overviews for certain medical queries
SpaceX just got approval to launch another 7,500 next-gen Starlink satellites into orbit
Graphing Calculator Gets USB-C Upgrade
Reverse-Engineering The Tamagotchi IR Connection
EnderSpark: Convert Your Broken Creality FDM Printer Into An EDM Machine!
Australian Ham Clubs Build Enterprise-Grade Yaesu IMRS Repeater System
The Current State of Terrestrial Radio Streaming
Ham Radio Donation to Red Cross
YL POTA Party
Address Change of JARL QSL Bureau
As we near the end of the first full week of 2026, the persistence of AI hallucinations remains a primary challenge for the technology sector, with recent reports indicating that the transition to more sophisticated models has not resolved the fundamental issue of factual inaccuracy. Research from Duke University emphasizes that the transformer architecture continues to prioritize linguistic fluency over objective truth, frequently generating "plausible-sounding" falsehoods. A notable example of this in early 2026 is the "American Heartland Project," a regional development initiative that appears to be a collective hallucination amplified across multiple AI platforms, effectively "laundering" non-existent data into the digital record.
The real-world consequences of these errors are prompting significant regulatory and legal shifts. In Italy, the data protection authority recently concluded an investigation into DeepSeek only after the company agreed to implement mandatory warnings regarding the risk of hallucinations. Meanwhile, the legal system is contending with a rise in AI-generated briefs containing fabricated case law and citations. Beyond the digital realm, the robotics industry is seeing the emergence of "physical hallucinations," where humanoid robots misinterpret sensory data and make dangerous operational choices based on incorrect environment perceptions.
The impact on public health and information integrity is equally severe. Medical reports from early January 2026 warn of AI systems inventing dosages and clinical trials, posing direct risks to patients using automated diagnostic tools. In the media landscape, experts from the Reuters Institute and RNZ highlight a growing crisis of trust, as AI-generated misinformation becomes increasingly difficult for editors to distinguish from verified facts. As tech insiders warn of diminishing returns from "brute force" training methods, 2026 is shaping up to be a year of reckoning for industries forced to manage the gap between AI's conversational abilities and its lack of factual grounding.
The retail landscape in New Zealand faces a significant turning point as EB Games proposes the total closure of its physical stores nationwide. This move, driven by rising operating costs and a market-wide shift toward digital downloads, marks a potential end for one of the country's most prominent gaming retailers. While the local market recalibrates, international attention is turning toward digital sovereignty. In the UK, advocates are urging the government to reduce reliance on US "Big Tech" giants like Amazon and Google to protect national data privacy. Simultaneously, Google is facing a fresh legal battle over claims that it has hidden the settings required to opt out of AI training in Gmail, complicating the path for users trying to protect their private correspondence.
Cybersecurity remains a volatile front as hackers deploy a new "Blue Screen of Death" malware to trick users into compromising their own systems. This sophisticated phishing campaign targets the hospitality sector, using simulated system crashes to lure victims into running malicious commands. The threat landscape is further complicated by generative AI, which is now being used to accelerate identity attacks against Active Directory environments, allowing even low-skilled actors to automate the discovery of network vulnerabilities. Meanwhile, the hardware world isn't immune; Ledger confirmed a customer data leak via a third-party processor, and a critical unpatched flaw in TOTOLINK EX200 extenders has left thousands of devices open to full remote takeovers.
The race for AI dominance is reaching new heights as Elon Musk’s xAI secures $20 billion in Series E funding to expand its "Grok" models. Not to be outdone, AMD revealed a comprehensive roadmap at CES 2026, bringing AI-focused silicon to everything from laptops to cars. This surge in AI demand is forcing a total redesign of computer memory, with industry leaders moving toward High Bandwidth Memory (HBM) to keep up with data-hungry neural networks. On the hardware side, HP has managed to squeeze a full-powered Copilot+ PC into a keyboard form factor, while Dell is winning back fans by reviving its XPS line with physical function keys, moving away from unpopular "AI PC" design fads.
In the maker community, the boundaries between toys and professional robotics are blurring with the Quarky Intellio, an ESP32-powered controller compatible with LEGO Technic. Retro enthusiasts also have reason to celebrate, with the PiStorm68K supercharging vintage Amiga computers and the RPSX project allowing makers to upcycle original PlayStation shells into modern Linux PCs using the Raspberry Pi Compute Module 4. Even the most basic workshop tools are getting high-tech upgrades; a new DIY project brings PID temperature tuning to the humble hot glue gun, ensuring precision and safety for hobbyists.
The wearable market is experiencing some growing pains as Meta pauses the international expansion of its Ray-Ban Display glasses due to supply shortages. In the skies, the FCC has enacted a sweeping ban on the sale of all new foreign-manufactured drones in the U.S., a move aimed at bolstering domestic industry but leaving many hobbyists without access to cutting-edge models. Back on the ground, Ring is rolling out major 2026 upgrades, including AI-driven unusual event alerts and a new car alarm integrated into the home security network. For those looking for the next big thing in mobile, Motorola teased the Razr Fold, a book-style foldable set to challenge the market with a more competitive price point this summer.
The amateur radio world enters 2026 with a focus on discipline and growth. The FCC has issued a stern reminder to experimental HF stations to maintain proper identification to prevent spectrum interference. To help hams sharpen their skills, the 52 Week Ham Challenge has returned, offering a year-long curriculum of technical projects and operational milestones. These efforts coincide with breakthroughs in sensor technology, as Digid qualifies microscopic temperature and force sensors for mass deployment, potentially revolutionizing "e-skin" for the next generation of humanoid robots.
Become a supporter of the podcast and help me grow the podcast and studio by becoming an Insider, every little bit helps and is greatly appreciated.
If you have anything you’d like to share or comment on, email podcast .at. zl4kj .dot. nz, I would love to hear from you. Alternatively you can Send a Voice Message
EB Games proposes closing all New Zealand stores
Hackers use 'Blue Screen of Death' malware to target victims
UK urged to cut out US Big Tech for sake of digi sovereignty
Ledger confirms customer data lifted after Global-e snafu
Notorious hacking collective returns - but researchers say they fell for a honeypot
Meta pauses international expansion of its Ray-Ban Display glasses
Google Faces Gmail Lawsuit Over Hidden AI Training Settings
How generative AI accelerates identity attacks against Active Directory
Unpatched Firmware Flaw Exposes TOTOLINK EX200 to Full Remote Device Takeover
Founder of spyware maker pcTattletale pleads guilty to hacking and advertising surveillance software
HP just squeezed a desktop computer into a keyboard – and it's powerful enough to be a Copilot+ PC
Two Chrome Extensions Caught Stealing ChatGPT and DeepSeek Chats from 900,000 Users
A viral Reddit post alleging fraud from a food delivery app turned out to be AI-generated
Microsoft cancels plans to rate limit Exchange Online bulk emails
xAI says it raised $20B in Series E funding
AMD’s AI Chips Are Coming for Your Laptop, Desktop, and Car
FCC Bans Sale Of All Foreign Drones In The U.S Dell’s XPS revival is a welcome reprieve from the “AI PC” fad
Motorola reveals the Razr Fold, a book-style foldable launching this summer
Google and XREAL are doubling down on their Android XR partnership
Ring camera owners are getting some major upgrades in 2026
Hack Your LEGO Bricks with the ESP32-Powered Quarky Intellio
PiStorm68K Offers Supercharged Retro Amiga Experience
Turn your old PlayStation into a modern PC with the RPSX replacement motherboard and a Raspberry Pi Compute Module 4
Tired Of Burnt Fingers? Try PID Tuning The Hot Glue Gun
Digid Qualifies Its Tiny Temperature and Force Sensors for Mass Deployment
Two Events Illustrate How AI is Rewriting the Memory Book
FCC Reminds Experimental HF Stations to Identify Themselves
52 Week Ham Challenge Returns for 2026
The recent cyber breach at ManageMyHealth has exposed significant vulnerabilities within New Zealand’s primary health infrastructure, impacting a portal used by hundreds of thousands of people for managing appointments and sensitive medical records. While the company responded with mandatory password resets, the incident has fundamentally rattled public trust in digital health services. This unauthorised access by a third party signifies a major challenge for a system that increasingly relies on digital gateways to connect patients with their clinical data, highlighting the fragile nature of the relationship between the public and primary care providers.
A primary concern emerging from the fallout is the significant breakdown in communication between ManageMyHealth and the medical community. General practitioners across the country report being left in an information vacuum, unable to provide clear answers to anxious patients who naturally turn to their local clinic for guidance. This lack of transparency prevents doctors from properly assessing potential clinical risks, such as whether the integrity of medical notes or diagnostic reports has been compromised, which creates a level of uncertainty that is difficult to manage in a high-stakes clinical environment.
Although Health New Zealand has confirmed that its central systems remain unaffected, the breach highlights the risks inherent in the country’s digital transformation strategy and its heavy reliance on external vendors. The Public Service Association has voiced sharp criticism, suggesting that reductions in public sector IT expertise have eroded the technical oversight necessary to manage these complex third-party relationships. They argue that maintaining internal expertise is essential to ensure that the final stage of data delivery to patients remains secure and that the government retains the capability to properly audit the security protocols of private partners.
Ultimately, the ManageMyHealth incident serves as a stark reminder that cybersecurity is a vital component of patient safety, rather than merely an administrative or technical concern. As the investigation into the full scope of the breach continues, there is a renewed call for greater transparency and more robust security protocols across the entire health network. Restoring confidence will require more than just technical fixes; it demands a long-term commitment to protecting the permanent and sensitive medical histories of all New Zealanders during this period of rapid technological change.
Also in this episode or the Crystal Carrier Wave, I cover the significant developments in international security and corporate accountability. I discuss the United States Treasury Department’s unexplained decision to remove three Intellexa executives from its sanctions list despite their links to the Predator spyware. Meanwhile, the European Space Agency is grappling with another major crisis as cybercriminals claim to have stolen 200 gigabytes of sensitive data. On the legal front, Disney has agreed to a ten million dollar settlement over children’s privacy violations on YouTube, and I examine the concerning sale of sensitive national utility infrastructure data on the dark web.
The landscape of artificial intelligence is also shifting rapidly as we move toward 2026. Investors are now predicting significant labour market disruptions as generative AI transitions from a productivity tool to a primary driver of autonomous labour. Microsoft is doubling down on this shift by embedding AI agents directly into the Windows kernel, while OpenAI and Jony Ive are reportedly collaborating on a new AI-powered hardware pen. I also cover India’s order for X to fix Grok’s content filters and DeepSeek’s release of an open-source framework designed to train AI without relying solely on high-end Nvidia chips.
Modern security threats are becoming increasingly stealthy, highlighted by the Shai-Hulud supply chain attack that drained eight point five million dollars from Trust Wallet users. This silent exploit is further explored through the lens of Shai-Hulud 3.0, which demonstrates how open-source dependencies can enable undetected breaches. I also examine the RondoDox botnet targeting Next.js servers, a critical authentication bypass in IBM’s API Connect, and a widespread phishing campaign hijacking trusted Google Alerts. To counter these rising risks, Microsoft has announced it will make Teams "Secure by Default" starting in early 2026.
On the hardware and infrastructure side, I explore the surprise appearance of a massive thirty-two terabyte Seagate hard drive in Japan and a leaked twenty thousand milliamp-hour Samsung battery pack that may prioritise energy capacity over charging speed. Hong Kong is taking a different approach to digital safety by reintroducing physical bank interactions to stop scams. I look at why chip manufacturing has become a "team sport" regarding yield responsibility and discuss Tibidabo Scientific Industries' acquisition of the imaging specialists at XCAM.
And wrapping up, for the maker and amateur radio communities, I highlight a project to build an offline AI chatbot using a Raspberry Pi 5 and a clever hack that turns standard drill batteries into portable bench power supplies. In the automotive world, new 5G-A modems are reaching auto-grade standards for better vehicle connectivity. I also catch up on the latest ham radio news, including new weather overlays for DXLook, QRZ’s USA 250 Award, and the ARRL’s designation of 2026 as the Year of the Club. I wrap up with the scientific exploration of WSPR spectral width and the grant helping the 3Y0K expedition reach the remote Bouvet Island.
US removes three spyware-linked executives from sanctions list - and there's no explanation why
European Space Agency hit again as crims claim 200 GB haul
Trust Wallet Chrome Extension Hack Drains $8.5M via Shai-Hulud Supply Chain Attack
Investors predict AI is coming for labor in 2026
RondoDox botnet exploits React2Shell flaw to breach Next.js servers
Inside Microsoft’s Plan to Embed AI Agents Deep Into Windows
Disney will pay $10 million to settle children's data privacy lawsuit
Wild leak points to 20,000mAh battery for Samsung, but there's bad news
Hong Kong uses brick-and-mortar banks to stop scams
OpenAI and Jony Ive may be working on an AI-powered pen
Shai Hulud 3.0 Exposes How Open Source Dependencies Enable Silent Breaches
IBM warns of critical API Connect auth bypass vulnerability
Seagate’s biggest hard drive quietly hits Japanese stores, carrying massive capacity, a limited explanation, and a price that shocks
Cybercrook claims to sell critical info about utilities
India orders Musk's X to fix Grok over 'obscene' AI content
Microsoft Makes Teams ‘Secure by Default’ Starting January 2026
DeepSeek Publishes Open Source AI Training Framework To Bypass Nvidia Chip Limits
Trusted Google Alerts Hijacked in Large-Scale Phishing Campaign
Chip Manufacturing is a Team Sport, Everyone Now Responsible for Yield
Tibidabo Scientific Industries buys XCAM
Offline AI Chatbot Build #piday #raspberrypi
5G-A cellular modem is auto-grade
A Bench Power Supply From a Drill Battery
DXLook Adds Map Layers and Weather Radar Overlays
QRZ Announces USA 250 Award
2026 is ARRL’s Year of the Club -- A Celebration of Amateur Radio Clubs
Raleigh Hamfest Seeks Presenters
ARRL Awards Colvin Grant to Bouvet DXpedition
HamSCI Speaker Series Explores WSPR Spectral Width
Happy New Year, I truly hope 2026 is a wonderful and prosperous year for you and your family.
This years tax season opens amid heightened digital threats following a major security breach at Massachusetts-based accounting firm CSA Tax & Advisory. The Russia-linked ransomware group Lynx, a rebrand of the INC operation, has claimed responsibility for exfiltrating sensitive client data, including Social Security numbers, tax returns, and spousal health information. This breach allows attackers to employ a "first-to-file" strategy, submitting fraudulent returns to steal refunds before legitimate taxpayers can take action.
Beyond individual data theft, cybercriminals are targeting tax professionals through "New Client" scams, using spear-phishing emails with malicious attachments to gain broad access to entire firm networks. Taxpayers are also facing "refund deposit" scams, where fraudulent money is placed into their accounts only for scammers to pose as IRS agents demanding its return.
The IRS has warned against "ghost" preparers who refuse to sign returns and social media "tax hacks" on platforms like TikTok that encourage fraudulent claims. To defend against these evolving threats, security experts strongly recommend the IRS Identity Protection PIN (IP PIN) program. This six-digit code acts as a necessary second factor of authentication, effectively blocking unauthorized filings even if a taxpayer's Social Security number has been compromised
This episode of the Crystal Carrier Wave covers a range of tech stories. I discuss the widespread impact of the MongoBleed vulnerability, which has left thousands of servers exposed, and explore Samsung’s upcoming Brain Health feature designed to detect early signs of dementia.
There’s also an update on the US TikTok deal and a look at an affordable alternative to Microsoft Office. I compare the new Note A1 NXTPAPER with the Kindle Scribe’s E-Ink approach, and examine renewed privacy concerns sparked by Google’s Nano Banana AI.
The episode highlights how Zoom Stealer browser extensions are harvesting corporate meeting intelligence, and reports on US cybersecurity experts pleading guilty to BlackCat ransomware attacks.
I also touch on Nvidia’s $20B deal to license Groq AI inference technology, and discuss research linking infant screen time to increased anxiety and slower cognition.
Other stories include the Korean Air breach exposing thousands of employees, a confirmed breach at the European Space Agency, and common mistakes people make when factory resetting Android phones.
I finish things off with insights from robotics executives, a new self-hosted C compiler for the ESP32/Xtensa, the strategic importance of batteries in American defense, and a fun segment on the usefulness of the original Raspberry Pi in 2025 & now 2026.
Thousands of servers exposed as MongoBleed vulnerability exploited
Samsung is reportedly readying a Brain Health feature to check for early signs of dementia
Here’s what you should know about the US TikTok deal
Don’t Want To Overpay for Microsoft Office? This Dupe Is $20
The Note A1 NXTPAPER arrives with specs that contrast the Kindle Scribe’s E-Ink approach
Google’s Nano Banana Renews AI Privacy Concerns for 1.5B People
Zoom Stealer browser extensions harvest corporate meeting intelligence
US cybersecurity experts plead guilty to BlackCat ransomware attacks
Nvidia Licenses Groq AI Inference Technology in $20B Deal
Infant screen time linked to anxiety, slower cognition
Thousands of employees exposed as Korean Air compromised in Oracle breach
European Space Agency confirms breach of "external servers"
You're factory resetting your Android phone wrong
Robotics Execs Tamper Down Expectations
Xcc700: Self-Hosted C Compiler For The ESP32/Xtensa
How Batteries became the 'Heart' of American Defense Future
How useful is an original Raspberry Pi in 2025? (ft Blue Raspberry)
https://www.onallbands.com/guide-to-december-2025-ham-radio-contests-year-end-wrap-up-edition/
https://mysarl.org.za/contest-resources/
https://www.425dxn.org/index.php?op=wcal
https://yotacontest.mrasz.org/rules-2026/english
https://www.arrl.org/special_events/search/page:1/model:Event
Mozilla has officially responded to intense community backlash following its recent pivot toward becoming a modern AI browser under new CEO Anthony Enzor-DeMeo.
While the company initially outlined an ambitious roadmap featuring integrated chatbots, page summarization, and a dedicated AI workspace, the announcement sparked widespread concerns regarding feature bloat, privacy risks, and excessive resource consumption.
To address these criticisms and preserve its identity as a privacy-focused alternative to mainstream browsers, Mozilla confirmed the development of a global AI kill switch scheduled for release in the first quarter of 2026.
This high-visibility setting will provide an unambiguous, one-click method to deactivate every AI-related component, ensuring that all generative tools remain strictly opt-in and can be completely purged from the user interface.
By implementing this absolute deactivation feature, Mozilla aims to balance necessary innovation with a firm commitment to user agency and technical transparency.
Also on this episode of the Crystal Carrier Wave, I do a 2025 year-end wrap-up with a look back at the defining shifts in the consumer technology landscape, where the year transitioned from AI hype into functional, integrated reality. We revisited the major themes from CES that set the tone for the year, including the rise of energy-independent homes and the mainstreaming of non-invasive medical sensors. It was also a year of notable course corrections, as we recapped the high-profile "tech trainwrecks" where over-ambitious AI hardware and aggressive software integrations met significant consumer pushback. We reviewed the massive market shifts triggered by the DeepSeek R1 release and the United States’ half-trillion-dollar commitment to Project Stargate, alongside the sobering reality of the Salt Typhoon telecom breach that rewrote the book on national cybersecurity.
In the electronics and maker space, 2025 proved to be an era of surprising consolidation and creative revival. We discussed the industry-shaking news of Qualcomm’s Arduino acquisition and the subsequent launch of the Linux-capable Uno Q, alongside the Raspberry Pi Foundation's continued commitment to accessibility with the 1GB Pi 5. The maker spirit was on full display as we recapped the most ingenious projects of the year, from hackers breathing new life into the vintage Nokia N900 to the successful crowdfunding of high-performance open-source e-ink monitors. We also took a lighter look at the "weird and wonderful" side of hardware, including solar-powered Jedi robes and AI-integrated bird baths that brought computer vision into the backyard garden.
We concluded the retrospective by focusing on the airwaves, documenting a historic year for amateur radio and new media. Significant regulatory milestones took center stage, including the FCC’s long-awaited 60-meter band allocation and the massive licensing overhaul conducted by Ofcom in the UK. We revisited the peak of Solar Cycle 25, which provided legendary propagation for operators while challenging satellite launches with intense M-class flares. The year was punctuated by community celebrations like the 25th anniversary of amateur radio on the ISS and the mobilization of citizen scientists to track the interstellar visitor 3I/ATLAS. Finally, we looked at the evolving media landscape where AI-driven production and vertical video formats became the new standard for broadcasters worldwide.
Become a supporter of the podcast and help me grow the podcast and studio by becoming an Insider, every little bit helps and is greatly appreciated.
If you have anything you’d like to share or comment on, email podcast .at. zl4kj .dot. nz, I would love to hear from you. Alternatively you can Send a Voice Message
Tech Trainwrecks: 2025's Biggest Fails
MIT’s top research stories of 2025
CES 2025 Proves It's Still Deeply Weird With These Bonkers Gadgets
The Eight Coolest Inventions From the 2025 Consumer Electronics Show
2025 Tech News Roundup: The Biggest Stories of the Year
2025 in Tech: A Year of Outages, AI Races, and Power Plays
10 Major Cyberattacks And Data Breaches In 2025
New Apple Products 2026: Upcoming iPhone, Mac, iPad & Apple Watch product releases
25 AI Developments You Must Know in 2025
The Ten Most Significant Science Stories of 2025, From Medical Breakthroughs to an Interstellar Visitor
November 2025 Tech Litigation Roundup
Galaxy A37, A57 camera specs leak: A big upgrade for the cheaper phone
WWDC 2025: Everything We Know
November 2025: Major Cyber Attacks, Ransomware Attacks, Data Breaches
What Comes Next for Arduino after Qualcomm’s Acquisition?
NEW PRODUCT – Raspberry Pi 5 – 1 GB RAM « Adafruit Industries – Makers, hackers, artists, designers and engineers!
MWC 2025: All the Strange, Bizarre and Wonderful Gadgets and Concepts
The Nokia N900 Updated For 2025
The 10 WEIRDEST Gadgets From CES 2025
Old FM Radio Upcycled Into Classy Bluetooth Speaker
Northwestern University Millimeter Pacemaker: The Best Inventions of 2025
The Wireless Institute of Australia
Up to $25,000 at Stake in New ARRL Student Coding Competition
Amateur radio: more freedom to innovate
Chairman Carr Highlights Wins Delivered in 2025



