More stories

  • in

    The best VPNs with antivirus of 2025: Expert tested and reviewed

    A virtual private network and antivirus perfectly complement each other to fend off cyber threats. As the VPN provides privacy and data security online, the antivirus remains vigilant against potential offline threats that can infiltrate your system. Some providers package the two together for less, saving you the additional costs of buying them separately.In most cases, however, a VPN with antivirus may not be as effective for cleaning your system as a dedicated antivirus, just like the latter won’t do a VPN’s job any better. You should, therefore, be precise about the kind of protection you mostly want before deciding if you should get a VPN with antivirus or vice versa. That being said, my hands-on tests enabled me to shortlist some of the best VPN-antivirus combo providers to give you all-around protection.Also: The best VPN services: Expert tested and reviewedWhat’s the best VPN with antivirus right now?After looking into different services, we picked the Surfshark One security suite as the best overall. We found many utilities that might be helpful when using the software as a VPN or antivirus. Beyond the great VPN service delivery we experience in our Surfshark More

  • in

    Google’s March Pixel Drop just arrived with 10 serious upgrades – here’s what’s new

    Adam Breeden/ZDNETGoogle is rolling out its March 2025 Pixel feature drop, bringing some serious upgrades to the entire Pixel family. Also: 4 Pixel phone tricks every user should know – including my favoriteMost Pixel phones are getting new scam detection, the Pixel Watch 3 is receiving a first-of-its-kind feature, there’s a new option to share your location with friends, and more. What’s new in the March 2025 Pixel feature drop?Among all the new features in this month’s drop, 10 stand out. For example, your Pixel phone is gaining a new way to protect you, and your Pixel Watch is receiving a never-before-seen feature.  Here’s what’s new.Also: This $100 Android phone reminded me of my Pixel 9 Pro in the best way1. Real-time alerts for suspicious textsFirst up: In addition to listening in on your calls for words associated with scams, your phone now monitors your text messages. With AI-powered Scam Detection on-device, Google says Messages will now flag text patterns commonly associated with scams and alert you about suspicious conversations. While the phone call version of this feature is only available on the Pixel 9, the text message version is available on the Pixel 6 and newer. 2. Share your location with trusted contactsFind My Device now lets you share your location with trusted contacts. With the same app you use to find a lost device, your friends can now see your live location on a map, no matter which device they’re using. This is coming to all Android devices. 3. Loss of pulse detectionPixel Watch 3 users are getting a first-of-its-kind, life-saving feature in the form of loss of pulse detection. If your watch detects that you’ve lost your pulse, it can automatically place a call to emergency services. This will start rolling out at the end of this month. 4. Generate images of people in Pixel StudioIf you use the Pixel 9’s Pixel Studio, which lets you generate AI images from text prompts, you’ll soon be able to generate images of people. Just describe the person or scene you want, Google says, like “3D cartoon” or “video game,” and Pixel Studio will work its magic. More

  • in

    Goodbye Gemini, hello Pixel Sense? What we know about Google’s AI assistant for Pixel 10

    Google/ZDNETAs far back as 2023, Google was reportedly working on an AI assistant for Pixel phones called “Pixie.” Many people expected to see that assistant debut with the Pixel 9, but we haven’t really heard anything about that project since.Until now. Pixel Sense on Pixel 10According to a report from Android Authority, Google is dropping a new context-aware assistant with the Pixel 10 — Pixel Sense. Also: Gemini Live just got much easier to talk to – here’s howAndroid Authority says Pixel Sense will use information on your phone to provide a much more personal assistant experience. It will be able to pull information from a number of other apps, including Calendar, Chrome, Contacts, Docs, Files, Gmail, Keep Notes, Maps, Messages, Phone, Photos, Recorder, Screenshots, Wallet, YouTube Music, and YouTube. The AI-powered assistant will run fully on-device, meaning you’ll be able to use it offline and “not even Google can see” your data. It will be able to process media files, including text and images, and process screenshots (sounds like Pixel Screenshots). Pixel Sense will provide personal predictive suggestions, like suggesting places and names you use often, adapt to your interests, and learn how you use your phone to complete tasks faster. More

  • in

    The best Discover Samsung Spring sale deals: Shop Galaxy S25 phones, TVs, and more

    Current price: $600Original price: $800Samsung’s Freestyle 2 combines a projector and a gaming hub all-in-one, and the Freestyle 2 builds on its predecessor with greater functionality, a better remote, and some literally game-changing features. In fact, what’s distinctly unique about the Samsung Freestyle 2 Gaming Hub is that you don’t need a physical console to play a game, but just the Freestyle 2, internet access, and game controller.Read more: Samsung’s latest swiveling projector is secretly the best gaming console you can buyWhen ZDNET’s Allison Murray and her husband tested the Freestyle 2 in their home, they were impressed with the portable projector’s power-packed value, and the ability to play video games from the ceiling — or any room in the house with an open wall. “My husband was able to play Rocket League with a free membership to GeForce Now, and other free games like Fortnite were also available. The overall gaming experience will depend on your Wi-Fi connection, but the graphics were crystal clear, and the Freestyle 2 loaded the games fast with virtually no glitches,” Murray said. And the Freestyle 2’s projecting capabilities weren’t lackluster, either. “The Samsung Freestyle 2 impressed me with both image quality, the ability to auto-focus — whether it was projecting onto a slanted ceiling or a projector screen — and the overall experience of setup and streaming,” Murray wrote in her review.  More

  • in

    I’ve never lost a drone in over a decade of flying them – here’s my secret

    Adrian Kingsley-Hughes/ZDNETI’ve been flying drones, both recreationally and commercially, for over a decade — and hold a handful of drone licenses and certifications. Over those hundreds of hours of flying, I’ve yet to lose a drone. Yet, almost daily, I come across stories on social media of people losing their drones. Some drones crash on their first flight, some after months or years of problem-free service. Also: I tested DJI’s new foldable drone, and would recommend it to both beginners and professionalsI attribute my success, luck, and good fortune in part to experience, but mostly to the fact that I carry out regular safety checks on my drone. A drone is an aircraft, and just as you wouldn’t put a plane in the sky that hadn’t had safety checks carried out on it, I wouldn’t put a drone in the sky without doing the same. So, what tests should you do, and when?I have three sets of checks that I do: pre-flight checks, post-flight checks, and checks carried out every two weeks to a month (depending on how often I’m flying… the more I fly, the more often I check). Why pre-flight and post-flight checks? One set is to catch damage that might have occurred while storing or transporting the drone (and anything I might have missed after the last post-flight check). The post-flight checks are there to catch anything that might have happened during the flight. Also: The DJI Mini 2 SE drone is a great starter droneThe biweekly/monthly checks are there to again take a fresh look at the drone, as well as a deeper look at things like the batteries. And it’s not just looking at the drone. Pre-flight checks take into consideration other things that can affect your drone. Pre-flight checks Drone checksCarefully check the drone for any visible damage to the frame, propellers, or landing gear. You’re looking for anything from cracks and chips to bending and seams popping open.Ensure propellers are securely attached and free of cracks or chips. Propellers are cheap, your drone isn’t. Replace them if they show any signs of damage. I always recommend using genuine propellers rather than third-party accessories.Ensure that all the propeller motors rotate freely.Check that the battery is fully charged and securely fitted. The last thing you want to happen is for the battery to fall out mid-flight (yes, that does happen).Also: I tested DJI’s palm-sized drone, and it captured things I had never seen before More

  • in

    What is vishing? Voice phishing is surging – expert tips on how to spot it and stop it

    ZDNETCybercriminals and hackers employ a variety of methods to access and steal sensitive information from individuals and organizations. One increasingly popular approach is vishing, or voice phishing. Here, the attacker tricks someone into sharing account credentials or other information through a simple phone call. According to the latest data from security firm CrowdStrike, these types of attacks have been skyrocketing. Also: Hackers stole this engineer’s 1Password database. Could it happen to you?In its 11th annual 2025 CrowdStrike Global Threat Report, the security provider revealed that vishing attacks jumped 442% in the second half of 2024 compared with the first half. Throughout the year, CrowdStrike Intelligence tracked at least six similar but distinct campaigns in which attackers pretending to be IT staffers called employees at different organizations. Help desk social engineering In these particular campaigns, the scammers tried to convince their intended victims to set up remote support sessions, typically using the Microsoft Quick Assist tool built into Windows. In many of these, the attackers used Microsoft Teams to make the phone calls. At least four of the campaigns seen by CrowdStrike used spam bombing to send thousands of junk emails to the targeted users as a pretext for the alleged support call. Also: How to protect yourself from phishing attacks in Chrome and FirefoxThe type of vishing used in these attacks is often known as help desk social engineering. Here, the cybercriminal posing as a help desk or IT professional stresses the urgency of the call as a response to some made-up threat. In some cases, the attacker requests the person’s password or other credentials. In other cases, such as the ones documented in the report, the scammer tries to gain remote access to the victim’s computer. Callback phishing Another tactic seen by CrowdStrike is callback phishing. Here, the criminal sends an email to an individual over some type of urgent but phony matter. This could be a claim for an overdue invoice, a notice that they’ve subscribed to some service, or an alert that their account has been compromised. The email contains a phone number for the recipient to call. But naturally, that number leads them directly to the scammer, who tries to con them into sharing their credit card details, account credentials, or other information. Because these attacks are usually aimed at organizations, ransomware is another key component. By gaining access to network resources, user or customer accounts, and other sensitive data, the attackers can hold the stolen information for ransom. Also: The top 10 brands exploited in phishing attacks – and how to protect yourselfIn its report, CrowdStrike identified a few different cybercrime groups that use vishing and callback phishing in their attacks. One group known as Chatty Spider focuses mostly on the legal and insurance industries and has demanded ransoms as high as $8 million. Another group called Plump Spider targeted Brazil-based businesses throughout 2024 and uses vishing calls to direct employees to remote support sites and tools. “Similar to other social engineering techniques, vishing is effective because it targets human weakness or error rather than a flaw in software or an operating system (OS),” CrowdStrike said in its report. “Malicious activity may not be detected until later in an intrusion, such as during malicious binary execution or hands-on-keyboard activity, which can delay an effective response. This gives the threat actor an advantage and puts the onus on users to recognize potentially malicious behavior.” Other security firms have seen a dramatic rise in vishing attacks. Last October, Zimperium’s zLabs research team uncovered a malware known as FakeCall, notable for its advanced use of vishing. Here, the scammers use phone calls to try to trick potential victims into sharing sensitive information such as credit card numbers and banking credentials. FakeCall itself works by hijacking the call functions on Android phones to install the malware. More