Author: Jason Davies

NewsSecurity Vulnerabilities

Microsoft Windows NTLM Hash Disclosure Spoofing Vulnerability (CVE-2025-24054)

CVE number = CVE-2025-24054 This is a spoofing vulnerability involving the Windows New Technology LAN Manager (NTLM) hash, which Microsoft

Read More
NewsElectronics

British soldiers take down drone swarm in groundbreaking use of radio wave weapon

The trial was completed at a weapons range in West Wales and was the largest counter-drone swarm exercise the British Army have conducted to date.

Read More
NewsCyber Security

CISA Extends Funding to Support MITRE’s Critical CVE Program

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has announced the continuation of government funding for the Common Vulnerabilities and Exposures (CVE) program, securing its ongoing operations.

Read More
New Products

Polaroid Flip – The ultimate point-and-shoot instant camera for an analog life

Polaroid unveils the Flip: A tech-packed instant camera for high-quality shots at the click of a button. With modern innovation hidden inside an iconic point-and-shoot design, the Polaroid Flip is the ultimate instant camera for an analog life.

Read More
NewsComputerGamingHardware

Acer Debuts Nitro Gaming PCs Featuring Latest NVIDIA GeForce RTX 50 Series GPUs

New Acer Nitro AI laptops with slim options and the Nitro 20 desktop offer solid performance and essential AI capabilities, supported by new NVIDIA GeForce RTX 5060 GPUs.

Read More
NewsComputerNetworking

Researchers demonstrate the UK’s first long-distance ultra-secure communication over a quantum network

Researchers have successfully demonstrated the UK’s first long-distance ultra-secure transfer of data over a quantum communications network, including the UK’s first long-distance quantum-secured video call.

Read More
NewsComputer

UK Government gets £121 million boost for quantum technology

Cutting-edge quantum technology is being put to work to deliver the UK government’s Plan for Change, with a new £121 million investment to help tackle challenges including crimefighting, spotting the first signs of fraud and halting money laundering which could save billions for the economy.

Read More
Tech TipsComputerHardware

The History of Computer Memory

Computer memory is one of the fundamental building blocks of modern computing. Without memory, our devices wouldn’t be able to store data, run applications, or even boot up. But memory, as we know it today—measured in gigabytes and stored on sleek microchips—has come a long way.

Read More
NewsElectronics

Donald Trump exempts smartphones and computers from new tariffs

The U.S. government has issued tariff exemptions for smartphones, computers, and various other electronics—most of which are imported from China—shielding them from President Donald Trump’s substantial 125% reciprocal tariffs.

Read More
NewsSecurity Vulnerabilities

Jenkins Host key reuse in SSH build agent Docker images (CVE-2025-32754 and CVE-2025-32755)

CVE numbers CVE-2025-32754 and CVE-2025-32755. In jenkins/ssh-slave Docker images based on Debian, SSH host keys are generated on image creation

Read More