The Latest

Before the better-known Strava lawsuit against Garmin grabbed headlines last year, Suunto had actually sued Garmin first. In September, Suunto and their parent company Dongguan Liesheng quietly filed suit against Garmin over five patent infringement allegations. Garmin recently responded with a 218-page countersuit that reads less like a legal filing and more like Garmin decided it was done being polite.

Why did Suunto sue Garmin?

The five patents in the initial lawsuit from Suunto had to do with the following features:

  • Golf shot tracking using an accelerometer to detect impact

  • Respiration rate derived from an optical heart rate sensor

  • Slot mode antenna design in wearable devices

  • Antenna placement in a wrist-worn device

  • Additional wrist-worn antenna design concepts

Three of the five are antenna-related, one covers physiological metrics, and one is about golf shot detection. As patent lawsuits go, Suunto's original filing was relatively standard in tone; Garmin's response was not. Suunto and Garmin are not, historically, enemies. The two companies coexisted constructively for the better part of two decades, with Suunto licensing numerous technologies from Garmin during that span. That's what makes this lawsuit stand out. 

What's in Garmin's 218-page countersuit

So how did Garmin respond to all of this? Well, here’s a stand-out quote, spotted by DC Rainmaker: "Like everything else, Suunto predictably looked to copy Garmin's GPS technology as it fell behind in the marketplace." That’s pretty blunt language to have on the record.

Garmin's response goes on to argue that Suunto's products have historically followed Garmin's technology roadmap, particularly around GPS features. Garmin filed five counter-patents of its own, and the filing makes clear the company intends to fight.

What’s also worth noting in Garmin’s language is a recognition that the company it's going after in court isn't quite the same Suunto it spent two decades working alongside. Garmin seems to understand that it's fighting Dongguan Liesheng's lawyers more than it's fighting Suunto's people.

What the Suunto/Garmin lawsuit means for you

Patent cases between major tech companies move slowly. Claims get narrowed, filings get amended, and many of these disputes end in cross-licensing agreements rather than verdicts. For athletes and consumers, nothing about your current devices or features changes in the short term.

But stepping back, this case is a useful reminder of just how much intellectual property is layered underneath a modern sports watch. The hardware and software that makes these devices work is deeply patented territory, and when ownership structures change and relationships cool, that IP becomes leverage. As always, if you have any precious data saved to a watch or app, make sure to back it up on your own personal hard drive. 

For the full technical breakdown of the filings, Ray Maker's reporting over at DC Rainmaker is the definitive read.


from Lifehacker https://ift.tt/sf6ag8n

We may earn a commission from links on this page.

The MacBook Neo might just eclipse the iPhone Air as the most interesting Apple product in years. This machine offers buyers the full macOS experience, in their choice of fun new colors, for $599 ($499 for "students"). Not so long ago, Apple's cheapest laptop, the MacBook Air—long priced at $999, but increased to $1,099 with the launch of the current M5 model—felt like a good deal. Now, you can get a machine that includes all of Apple's latest Mac features for as little as half the price.

Of course, the Neo isn't a MacBook Air. To get the price of a Neo down to $500 or $600, Apple had to make some concessions, like using a mechanical trackpad instead of a modern haptic one; the absence of Touch ID on the base model keyboard; older USB-C tech, including one USB-2.0 port; and no backlight on the keyboard. These are things many users won't notice or won't miss much in light of the price. But what's really allowing for the lower cost of the MacBook Neo is arguably its most interesting feature: While all of Apple's Macs now run the company's M-series chipset, the Neo is running the A18 Pro, the chip Apple put in the iPhone 16 Pro, coupled with 8GB of RAM.

Not only is the Neo running an iPhone SoC, this one has one fewer GPU core than the A18 Pro found in the iPhone, as Apple is using the "binned" version of the chip for this laptop. When chips are manufactured, some come out better than others. The better ones are sold as higher-end chips, while others are sold as lower-performing chips, or "binned" chips. In this case, the MacBook Neo is running A18 Pros that weren't up to the iPhone 16 Pro standard. You can see that from the Neo's tech specs: While it has the same six-core CPU as the iPhone 16 Pro, the Neo has a five-core GPU, one fewer than the iPhone 16 Pro's six-core GPU.

It seems safe to assume that a MacBook running a binned iPhone chip, with 8GB of RAM, no less, wouldn't fare as well running the latest macOS as a chip designed for the operating system. But the truth is more complicated than that.

MacBook Neo keeps up with some M-series MacBooks in benchmarking

While there aren't any full reviews of the MacBook Neo quite yet, initial benchmarks, as spotted by MacRumors, are quite promising. The Neo's first Geekbench tests show the laptop's A18 Pro chip scores a 3461 in single-core performance, 8668 in multi-core performance, and 31286 in Metal (GPU) performance.

Those numbers don't mean anything unless they're compared to other devices, of course. Let's look at the iPhone 16 Pro first: Despite having one more GPU than the Neo, the 16 Pro has slightly lower single-core (3445) and multi-core (8624) scores. That sixth GPU core likely helps it eke out a win in the Metal test, scoring a 32575. Still, performance across the board is relatively similar between the two devices—despite running totally different operating systems.

Where things start to get really impressive, however, is when you start comparing the Neo's "iPhone" chip to the Mac chips in other MacBooks. The M1 MacBook Air, for example, scores a 2346 in single-core, 8342 in multi-core, and 33148 in Metal. While M1 beats the Neo in Metal tests, the Neo's A18 Pro chip wildly outperforms M1 in single-core performance, and even wins out in multi-core by a few hundred points. That means simple tasks that don't require a lot of processing are going to run faster on the Neo than an M1 Air, as will complex tasks—though not by as much.

Even Apple's M4 MacBook Air doesn't totally obliterate the Neo. The M4 Air scores a 3696 in single-core, 14730 in multi-core, and 54630 in Metal. Yes, in multi-core and GPU-intensive tasks, the M4 Air smokes the Neo. But for single core tasks, it outperforms the Neo by a smaller margin than the Neo outperforms M1 in multi-core. Simple tasks will likely feel comparable between the M4 Air and the Neo.

The MacBook Neo could be a big win for Apple

Benchmarks don't necessarily reflect real-world performance, so we won't really know how the MacBook Neo stacks up against Apple's M-series MacBooks until reviewers put it through its paces. But these numbers only make me more convinced than ever that the MacBook Neo is going to be a huge success for Apple. Not only is this a great alternative to a Chromebook or a low-end Windows PC, it seems like it's a good MacBook in its own right. You could buy an older MacBook, say an M1 or M2 machine, or you could buy a brand-new Neo, and enjoy the perks that come with a fresh purchase.

That said, one area the benchmarks don't measure is multitasking. The Neo has 8GB of RAM, which should be find for single tasks, but once you start running too many things at once, you could choke the system. If you open too many browser tabs, or run too many apps at once, you may start to feel that pain. That's not an issue if you were between a Neo and an M1 MacBook Air with 8GB of RAM. But if you can find an M1 MacBook Air with 16GB of RAM at a similar price point, that might be the move. You'll get comparable performance and more flexibility for multitasking—not to mention some future-proofing with the additional RAM, as macOS gets ever more complex.


from Lifehacker https://ift.tt/SVEo2gP

Russian state hackers are trying to break into Signal and WhatsApp accounts used by diplomats, military staff, and government officials worldwide, Dutch intelligence agencies warned. They believe journalists and other people who attract attention from Moscow may also be affected.

Signal WhatsApp Russian hackers

Investigators reported attackers attempt to trick users into revealing verification codes and PINs that protect their messaging accounts.

The agencies said the Russian campaign does not exploit technical vulnerabilities in the messaging services. Instead, the attackers misuse legitimate security features of the apps.

“It is not the case that Signal or WhatsApp as a whole have been compromised. Individual user accounts are being targeted.” stated Director-General of the AIVD Simone Smit.

According to the agencies, hackers used two methods. One involves posing as a Signal support chatbot to trick targets into sharing login credentials. The other exploits the linked devices feature in Signal and WhatsApp, which allows additional devices to connect to an account.

Once the code is shared, attackers can read private conversations and group chats.

Users likely assumed that the reputation of apps like Signal would shield them from hacking attempts, a belief Russian hackers seem to have deliberately leveraged.

“Chat applications like Signal and WhatsApp, despite having end-to-end encryption, are not channels for classified, confidential, or sensitive information,” emphasizes Vice Admiral Peter Reesink, Director of the MIVD.

Officials advise users to watch for duplicate identities in group chats, as this can signal a compromised account. If the same person appears twice under identical or slightly different names, it may indicate an account takeover or a replacement profile. To support those affected, a cybersecurity advisory has been released.


from Help Net Security https://ift.tt/1Rp4iLz

We may earn a commission from links on this page. Deal pricing and availability subject to change after time of publication.

Charging multiple Apple devices often turns into a mess of cables. An iPhone charger here, an Apple Watch puck there, and another cable for AirPods. A single charging station like the Belkin MagSafe 3-in-1 Fast Wireless Charging Pad helps simplify things. It’s currently $39.99 at Woot, down from its original $149.99 price. The same charger is selling for about $100.58 on Amazon, and price trackers show it rarely dipping below $75.99. Shipping is free for Amazon Prime members—everyone else pays a $6 fee. Woot says the deal will stay live for 23 days or until it sells out, whichever happens first.

The appeal here is convenience: Instead of plugging in three separate chargers every night, this pad lets you place all your devices in one spot. It can charge an iPhone, Apple Watch, and AirPods at the same time, which is helpful if you use Apple gear daily and want a simple bedside setup. The phone section uses MagSafe magnets, so compatible iPhones snap into place without much effort. Charging speeds reach up to 15W for iPhone 12 models and newer, which is Apple’s standard for fast wireless charging. The Apple Watch section also supports fast charging for newer models like the Series 9, so a quick top-up in the morning can add a useful amount of battery. AirPods with a wireless charging case sit on the third section of the pad.

This charger is clearly built with Apple devices in mind, so it doesn’t make much sense if you use Android phones or non-MagSafe accessories. You also need an iPhone 12 or newer to get the magnetic alignment and full 15W charging speeds. Older iPhones will still charge, but without the magnetic guidance. At $39.99, it costs less than many single-device MagSafe chargers.


Deals are selected by our commerce team

from Lifehacker https://ift.tt/a2qr9ed

Speaker diversity in cybersecurity has been a talking point for over a decade, with panels, pledges, and dedicated conference tracks failing to produce change. Stages still skew heavily male, even as women represent millions of qualified professionals in the field.

SheSpeaksCyber, a free and open directory launched by the Women4Cyber Foundation, aims to close that gap by making female experts discoverable to event organizers worldwide. With a target of 50 percent female representation at cybersecurity events by 2030, the platform is as much a community movement as a search tool. We spoke with founder Erlend Andreas Gjære about how it works and why now.

women cybersecurity speakers

The cybersecurity conference circuit has been talking about the speaker diversity problem for well over a decade. There are panels, pledges, and diversity tracks. What makes a searchable directory the intervention that moves the needle when public commitment alone has not?

While I do believe the needle is moving already, I think it should be moving much faster. There are simply so many expert women in cybersecurity today, I am always surprised and disappointed when events fail to feature these in their programs.

When asking such event organizers about this, I often hear something like: “We tried to find a female speaker for topic X, but we couldn’t!”. With experts readily available through SheSpeaksCyber, such excuses should be irrelevant for the future.

Our co-founders at Women4Cyber Foundation have previously been receiving weekly requests from event organizers, asking them to recommend female speakers. Considering their manual effort with this, SheSpeaksCyber now allows time to be freed up for other activities.

With estimates of women in cybersecurity maybe just a little bit ahead of the 20% in IT altogether, there is much work left to do. Still, the actual number of female specialists are in the millions. And this number of people itself simply means that there are more than enough experts to go around for speakers at every event, regardless of percentage share, right?

SheSpeaksCyber is a directory, but you and Women4Cyber are calling it a movement. At what concrete point does a speaker directory stop being a UX convenience and start being something that shifts conference culture?

I believe the community here makes all the difference. Having the speaker directory available, free and open is just a tool. Then, the people who show up to actually use it – as speakers and event organizers, will be part of making the impact real.

There have been so many people reaching out these weeks since launch. Even those who are neither speakers (yet) nor organizers, including men, of course –stating their support and offering assistance, whatever that may be – from all over the world. I think the convenience of this directory is very efficient to progress in the conversations and, in turn, the culture.

Expertise is not always 1:1 with visibility, and many experts are way too careful to raise their hand and speak up. This could of course apply to men, too. However, to bridge an apparent gap here, making the community in general more visible and peers approachable to each other, can be the spark needed to dive into speaking. I have been part of an agency catalog for paid speakers myself (not specifically for cybersecurity), and picked up quite a few things from fellow speakers there. And I have connected with other “colleagues” in the catalog who I may never have connected with otherwise.

I think we can easily agree on the positive aspects of visibility for experts on stages. Both for their own personal career development, as inspiration for others, and for defining the agenda. Seeing the women and their expertise on stages makes all the change, the directory can only hopefully help them get there more often.

The stated goal is 50 percent female representation at cybersecurity events by 2030. That is a specific, measurable target. What metric are you tracking today, and how far off is the current baseline from that number?

As we launched the speaker directory in January this year, we set a target of 1,000 speaker profiles published before 2027 – and we’re already in the hundreds of speaker sign-ups so far. Not all are published yet, but simply the step of starting to draft a speaker CV can be something of value for the individuals, too.

While it’s still early days, speakers will be adding entries for their previous talks on their profile pages. From these data, it will be possible to survey progress according to linked event programs. The infrastructure is ready, we’re adding the speakers and content, and hopefully the network effect will continue to take it from here.

The website also includes a feed for events which are offering open calls for speakers/presentations (CfPs). While various other sources for these data exist, we’re looking to directly suggest relevant events for the speakers in the directory, as they appear. Hopefully event organizers will also want to publish their CfPs on the platform, and at the same time receive suggestions for relevant speakers. We haven’t set any target metrics for these things yet, it is rather about just solving some really basic stuff to unlock the community potential here even more.

If SheSpeaksCyber hits its 2030 target, what does that change about who gets to define what cybersecurity problems matter most at the industry level?

I love this question, because it highlights the importance of which voices are being heard. And voices who are put on stages are naturally heard by more people. This is really basic common sense, and that’s also why it matters.

My personal experience is that also among fellow speakers and panelists, opportunities present themselves for exclusive networking, including the typical speaker’s dinner. And this also extends to validating each other’s credentials, through the mutual experience of being accepted and invited onto stage together.

Peers tend to build connections for mutual respect and even future benefit over these occasions. If we’re no longer missing out on thousands of experts, also in the more closed circles because they’re now also present on stages, I think security improves for everyone.

Your background is in making cybersecurity feel approachable and human-centered for non-experts. SheSpeaksCyber is aimed at getting more women onto stages in front of experts. Is the confidence gap you are trying to close with this platform a discovery problem, a credentialing problem, or something more structural that a directory cannot fix on its own?

The overall lack of IT and cybersecurity skills is declared a gap and challenge towards safety and quality of life for each and everyone of us. The workforce skills gap can by no means be filled without the women.

Women are certainly needed in our industry for all the things which make them naturally different to men, too. Only then can we serve society as a whole, both men and women equally well, through the digital solutions we build and protect. Even equal pay is at stake with cybersecurity being a higher-paid industry, if the women aren’t equally represented.

SheSpeaksCyber is meant to solve the discovery part of the challenge, but I hope and believe it can also serve to help beyond this. We need efforts all the way from upbringing and education, through visibility, confidence and opportunity for expertise. Women are statistically not the first to raise their hand if someone invites the room in our industry, yet their expertise I think we can safely assume. If they are visible on SheSpeaksCyber, they should definitely be worth paying attention to.

Learn more: How to give better cybersecurity presentations


from Help Net Security https://ift.tt/dYOcubC

Autonomous AI agents running on developer workstations execute shell commands, fetch URLs, and write files with little or no inspection of what they are doing. Open-source project Sage inserts an interception layer between an AI agent and those operations, checking each action before it proceeds.

sage ai agents

The project applies the term Agent Detection & Response (ADR) to this class of tooling. The name is a deliberate parallel to the endpoint detection and response (EDR) category that has been standard in enterprise security for over a decade.

What Sage does

Sage works through hook systems native to the agent platforms it supports. It intercepts tool calls, including Bash commands, URL fetches, and file writes, in Claude Code, Cursor/VS Code, and OpenClaw.

Each intercepted action passes through several detection layers. URL reputation checking runs cloud-based malware, phishing, and scam detection. Local heuristics use YAML-based threat definitions for dangerous patterns. Package supply-chain checks cover registry existence, file reputation, and age analysis for npm and PyPI packages. Plugin scanning runs at session start and checks other installed plugins for threats.

The privacy model keeps most data on the local machine. Sage sends URL hashes and package hashes to Gen Digital reputation APIs. File content, commands, and source code stay local. Both services can be disabled for fully offline operation.

The threat data behind it

The tool’s release connects to research from Gen Threat Labs, which conducted an assessment of exposed AI agent infrastructure. Gen Threat Labs found more than 18,000 OpenClaw instances currently exposed to the internet and open for attack, along with nearly 15% of observed skills containing malicious instructions.

Siggi Stefnisson, Cyber Safety CTO of Gen, described the situation as a shift in which security failures are no longer just one bad click, but trusted AI assistants quietly turning into persistent insider threats.

Installation and access

For Claude Code, Sage installs as a plugin directly from the GitHub repository and requires Node.js 18 or later. A VS Code extension package is available for Cursor users. An npm package, @gendigital/sage-openclaw, covers OpenClaw installations.

Must read:

Subscribe to the Help Net Security ad-free monthly newsletter to stay informed on the essential open-source cybersecurity tools. Subscribe here!


from Help Net Security https://ift.tt/RPuqdTl

The cables running along the ocean floor carry the overwhelming majority of the world’s cross-border data traffic, and for most of their operational history they have attracted little strategic attention. That is changing. A new sector report from Capacity Insights draws on interviews with senior executives across the subsea industry to examine how demand growth, hyperscaler investment, and geopolitical pressure are converging on infrastructure that governments and operators are only beginning to treat as a security priority.

submarine cable security

Submarine cable security moves to the front of the threat agenda

The 2024 incident in the Baltic Sea, in which a Chinese-flagged vessel severed key cables, has become a reference point for the industry. Executives interviewed for the report describe the Baltic as a case study in what they call persistent grey-zone risk, where repeated damage incidents have prompted governments to increase scrutiny of cable routes and landing stations. Maxie Reynolds, founder of Subsea Cloud, notes that the strategic challenge is building frameworks where monitoring, incident response, and attribution can operate without breaking the cross-border commercial model that the industry depends on.

The physical security of cables and the cybersecurity of landing stations are now described in the report as front-line concerns for both operators and government risk assessors. Valentino Giuseppe, VP of product management at Sparkle, points to hybrid conflict scenarios as a driver of new preventative and deterrent measures at the national level.

Repair capacity is a resilience gap

Beyond deliberate interference, the sector averages between 150 and 200 cable faults per year, the majority caused by human activity such as fishing and anchoring. The report identifies repair logistics as a growing vulnerability. There is a shortage of specialized cable ships, spare parts, and experienced personnel, and industry leaders are candid about the timeline for closing that gap.

Carl Grivner, CEO at FLAG, states directly that there are not enough ships and that a short-term resolution is unlikely. Reynolds frames the operational risk in terms that security professionals will recognize: most networks can survive a single cut, but the question is whether customers can survive multiple correlated failures. Ana Nakashidze, CEO at AzerTelecom, is equally direct, saying the market remains segmented with no common platform for cross-border coordination.

Hyperscalers are reshaping ownership and risk dynamics

Cloud providers have moved from being wholesale capacity customers to acting as lead investors and infrastructure architects. The report describes this shift as a source of commercial tension, with hyperscalers now functioning simultaneously as partners, competitors, and, in some cases, direct owners of subsea assets. Their investment priorities, risk appetite, and operational timelines differ from those of traditional network operators, and aligning these interests is described as an ongoing challenge with consequences for long-term sector resilience.

Nakashidze warns that network operators risk seeing their role decrease as hyperscalers drive demand, maintenance, and infrastructure agendas. At the same time, she cautions against overinvestment driven by AI demand forecasts, noting that hype does not justify undisciplined capital allocation.

Sensing technology is extending cable capabilities

One development with direct relevance to security operations is the application of distributed acoustic sensing and AI-enabled fault detection to submarine cables. Giuseppe describes this as a transformation from passive conduit to active monitoring tool. As network utilization increases, these capabilities are moving from experimental to operational.

This shift means cables are no longer evaluated solely as data transport infrastructure. The integration of real-time monitoring and sensing functions into subsea systems adds a layer of operational visibility that operators and governments are beginning to factor into both security planning and incident response.

Coordination remains the central unsolved problem

The report does not identify a single technical solution as sufficient on its own. Across all four executive perspectives, the consistent theme is that resilience depends on coordination: between governments and private operators, across national regulatory frameworks, and among competing commercial interests. The subsea sector is expanding, but the governance structures, repair resources, and cross-border response mechanisms needed to protect that infrastructure are not keeping pace with the investment flowing into it.

Submarine cables have become strategic assets in their own right. Securing them requires the same combination of technical controls, organizational readiness, and cross-border cooperation that cybersecurity professionals apply to other categories of critical infrastructure.


from Help Net Security https://ift.tt/7BdFqiY