Connect with us

Tech

Dominate the Competition With These Elite Gaming Mice

Published

on

Dominate the Competition With These Elite Gaming Mice


Other Good Mice to Consider

NZXT Lift 2 Symm

Photograph: Eric Ravenscraft

NZXT Lift 2 Symm for $50: PC manufacturer NZXT has been venturing out into the peripherals market with impressive products for a company so relatively new to the game. The NZXT Lift 2 Symm is no exception. This mouse has a hollow interior and a base that uses minimal plastic. This gives it an ultra-lightweight feel, but avoids the odd feeling that other mice like the SteelSeries Aerox 3 give off by reducing the amount of plastic in the pieces that touch your hands. Combined with an 8,000-Hz polling rate, optical switches, and an excessively robust 26,000 dpi optical sensor, this mouse is more than capable of handling even the fastest games at a low price.

Logitech MX Master 3S for $120: The MX Master 3S isn’t a gaming mouse per se, but it’s also better at being a gaming mouse than many dedicated gaming mice. It features a few extra customizable buttons, plus a horizontal side scrolling wheel. It’s ridiculously comfortable. Logitech’s been making mice for years, and this mouse benefits from all that experience, with a smooth arc for your palm and a rest spot for your thumb. It even includes a button in that spot where your thumb naturally rests. This is the preferred daily mouse of many WIRED staffers. The one downside is that the 125-Hz polling rate is a bit low for competitive FPS games, but if you’re looking for something more solo, it’s hard to get more comfortable than this.

Logitech MX Anywhere 3S for $80: This a cheaper, compact mouse that can connect to up to three devices via Bluetooth, and gets 70 hours on a single three-hour charge. It doesn’t have as many fancy gaming-centric features, but if you just need a decent mouse and want to save a little money, this is a great option.

Image may contain Electronics Hardware Computer and Mouse

Logitech G203

Photograph: Logitech

Logitech G203 for $35: Budget gaming mice often forgo a lot of the conveniences and performance you get out of nicer models, but the Logitech G203 never feels like it’s lacking. The sensor has a lower maximum sensitivity than you’ll get out of a more expensive offering—8,000 dots per inch—so if you need that top-end sensitivity, you’ll want to look elsewhere, but it features six buttons, compatibility with Logitech’s G Hub software, and, most importantly, has RGB lighting. Those are all things you’d typically expect to pay more for.

Turtle Beach Burst II Air for $100: The Turtle Beach Burst II Air at times felt like it wasn’t even there. I’ve played with a lot of mice that cut out huge chunks of their plastic hull to reduce weight, but the Burst II Air feels incredibly light without all the gaping holes. The skates are so smooth I felt like I could push the mouse around by blowing on it. The USB-A wireless dongle fits inside a small compartment on the bottom, right next to a physical switch that swaps between 2.4 GHz and Bluetooth modes. Two customizable thumb buttons sit along the side, while a third button for cycling dpi sits farther down along the edge, which I found particularly interesting. Most mice put this button on the top of the mouse, where it can sometimes be accidentally pressed, but this spot is so convenient it makes me wonder why Turtle Beach is the first company I’ve seen place it here.

Logitech G Pro Wireless for $110: Logitech’s G Pro X series was designed with input from esports professionals. Lightning-fast response times and proper ergonomics ensure that the additional buttons are right where your fingers rest. The wireless receiver delivers 1-millisecond response times, so you won’t miss headshots due to lag. The buttons are satisfying and sturdy, with mechanically tensioned springs underneath both the left and right buttons, and separate key plates for accuracy. It lasts around 48 hours on a single charge, but if you want to completely forget about charging, get the wireless charging-mat bundle.

SteelSeries Aerox 9 wireless mouse

SteelSeries Aerox 9

Photograph: Eric Ravenscraft

SteelSeries Aerox 9 for $150: This has a large array of side buttons. Its shell also has a grid cutout pattern, which SteelSeries says helps reduce the weight of the mouse, but my roommate says it triggers her trypophobia, so your mileage may vary.

Razer Cobra Pro for $130: I am personally a fan of mice with a dozen extra buttons, but if you’d rather just have a little bit of extra power without being overwhelmed, the Razer Cobra Pro might be more your speed. It has two thumb buttons on the left side, as well as two dpi controls down the middle, all of which can be customized to your needs. While playing Overwatch 2, I like to use the dpi buttons to cycle between sensitivities for different heroes, but when I’m using it for work, I like that I can assign common shortcuts or macros that I need while getting things done.

Great Mousepads

One of the cheapest things you can do to upgrade your PC gaming experience is to invest in a high-quality mousepad. If you’re a mouse-and-keyboard gamer, having the right surface for your trusty little rodent can be super helpful. Not only do you have a nice little area of your desk cordoned off for mouse use, but you also get a surface designed to be as friction-free and slick as possible—so you’ll be as quick as possible.

Harber London Professional Leather Desk Mat a brown leathertextured mat with a computer keyboard and black computer...

Harber London Professional Leather Desk Mat

Photograph: Julian Chokkattu

Harber London Professional Leather Desk Mat for $193: Despite more than a year of use, this Harber London leather desk mat still looks exquisite. The pebbled leather is supple and has a nice texture, but your mouse will glide over it effortlessly. It comes in three sizes and three colors.

SteelSeries QcK Mouse Pad for $8: SteelSeries’ QcK mousepad is one of my all-time favorites. The medium size is perfect for most desks, even small ones. It’s well-made and doesn’t fray easily—cheaper mousepads often fray at the edges, which ruins the aesthetic a good mousepad can lend to a workstation.

Grovemade desk pad with keyboard mouse and coffee mug on top

Photograph: Grovemade

Grovemade Wool Felt Desk Pad for $70: This doesn’t seem like your usual gaming accessory, because it’s not. It’s a wool felt pad from Portland, Oregon, company Grovemade, and it’s large enough to fit a keyboard and a mouse with room to spare. It feels soft and plush under your wrists, and all of the gaming mice on this list just glide over its surface; it’s like they’re sliding on glass. It’s a big surprise, honestly. Not to mention, a felt desk pad adds an air of sophistication and style to any desk, without making it seem too uptight. The color looks amazing under RGB lighting in a dark room. It’s an easy and affordable way to inject some unique style into your work (and play) space.


Power up with unlimited access to WIRED. Get best-in-class reporting and exclusive subscriber content that’s too important to ignore. Subscribe Today.



Source link

Continue Reading
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

Tech

The ‘European’ Jolla Phone Is an Anti-Big-Tech Smartphone

Published

on

The ‘European’ Jolla Phone Is an Anti-Big-Tech Smartphone


“There are Chinese components as well—we are totally open about it—but the key is that as we compile the software ourselves and install it in Finland, we protect the integrity of the product,” Pienimäki says.

What makes Sailfish OS unique over competitors like GrapheneOS or e/OS is that it’s not based on the Android Open Source Project, but Linux. That means it has no ties to Google—no need for the company to “deGoogle” the software; meaning there’s a greater sense of sovereignty over the software (and now the hardware). Still, it’s able to run Android apps, though the implementation isn’t perfect. Another common criticism is that it’s not as secure as options like GrapheneOS, where every app is sandboxed.

There’s a good chance some Android apps on Sailfish OS will run into issues, which is why in the startup wizard, the phone will ask if you want to install services like MicroG—open source software that can run Google services on devices that don’t have the Google Play Store, making it an easier on-ramp for folks coming from traditional smartphones without a technical background. You don’t even need to create a Sailfish OS account to use the Jolla Phone.

Jolla’s effort is hardly the first to push the anti-Big Tech narrative. A wave of other hardware and software companies offer a “deGoogled” experience, whether that’s Murena from France and its e/OS privacy-friendly operating system, or the Canadian GrapheneOS, which just announced a partnership with Motorola. At CES earlier this year, the Swiss company Punkt also teamed up with ApostrophyOS to deploy its software on the new MC03 smartphone. Jolla is following a broader European trend of reducing reliance on US companies, like how French officials ditched Zoom for French-made video conference software earlier this year.

The Phone

A common problem with these niche smartphones is that they inevitably end up costing a lot of money for the specs. Take the Light Phone III, for example, a fairly low-tech anti-smartphone that doesn’t enjoy the benefits of economies of scale, resulting in an outlandish $699 price. The Jolla Phone is in a similar boat, though the specs-to-value ratio is a little more respectable.

It’s powered by a midrange MediaTek Dimensity 7100 5G chip with 8 GB of RAM, 256 GB of storage, plus a microSD card slot and dual-SIM tray. There’s a 6.36-inch 1080p AMOLED screen, the two main cameras, and a 32-megapixel selfie shooter. The 5,500-mAh battery cell is fairly large considering the phone’s size, though the phone’s connectivity is a little dated, stuck with Wi-Fi 6 and Bluetooth 5.4.

Uniquely, the Jolla Phone brings back “The Other Half” functional rear covers from the original. These swappable back covers have pogo pins that interface with the phone, allowing people to create unique accessories like a second display on the back of the phone or even a keyboard attachment. There’s an Innovation Program where the community can cocreate functional covers together and 3D print them. And yes, a removable rear cover means the Jolla Phone’s battery is user-replaceable.



Source link

Continue Reading

Tech

Attacks on GPS Spike Amid US and Israeli War on Iran

Published

on

Attacks on GPS Spike Amid US and Israeli War on Iran


Shipping through the Strait of Hormuz—the narrow but vital oil trade route in the Middle East—has almost ground to a halt since the start of the United States and Israel’s war against Iran. Tankers in the region have faced military strikes and a spike in GPS jamming attacks, a new analysis says.

Since the first US-Israeli strikes against Iran on February 28, more than 1,100 ships operating across the Gulf region have had their GPS or automatic identification system (AIS) communications technology disrupted, says Ami Daniel, the CEO of maritime intelligence firm Windward. Ships have been made to appear as if they were inland on maps, including at a nuclear power plant, the firm says.

The analysis comes as maritime officials have warned of a “critical” risk to ships operating in the region and as the initial conflict has quickly expanded to involve countries across the Middle East. At least three tankers in the region have been damaged in the conflict.

“We’re seeing a lot of GPS jamming,” Daniel says of shipping in the Strait of Hormuz and surrounding areas. The levels of electronic interference are “way above the baseline” of usual interference, he says. “It’s becoming very dangerous to go in and out.”

Over the last few years, attacks against GPS and navigation systems have been on the rise—largely driven by the wars in Ukraine and Gaza. They can impact people’s phones or devices, but also disrupt the safety and navigation systems in planes and ships. The electronic interference largely comes in two forms: jamming and spoofing. During jamming attacks, satellite signals are overwhelmed so that positioning data isn’t available. Whereas spoofing can create false signals that make an object appear incorrectly on a map—for instance, making ships appear as if they are inland at airports.

Inaccurate location data can lead to ships running off course, potentially increasing the chances of them crashing into other tankers, running aground, or causing damaging oil spills. In warzones, electronic interference is often used to try and disrupt the navigation systems of drones or missiles, which can rely on location data to find and hit their targets.

Analysis of shipping data by Windward found that there has been an “escalating” level of electronic interference across Iranian, United Arab Emirates, Qatari, and Omani waters since the initial strikes on February 28. Daniel says that the majority of the activity the company has identified so far has been jamming rather than spoofing. The company’s analysis says it has identified around 21 “new clusters” where ships have had their AIS data jammed in recent days.

“Ships were falsely positioned at airports, a nuclear power plant, and on Iranian land, creating navigation and compliance risks,” a report from the firm says. “AIS signals have also been diverted to the Barakah Nuclear Power Plant and nearby waters, while hundreds of other vessels are creating circle-like patterns off UAE, Qatari, and Omani waters.”

GPS and AIS interference within the Strait of Hormuz and the surrounding area is not new. In June 2025, as Israel and Iran exchanged missile fire, significant jamming in the region was reported.

While almost all commercial air travel has been grounded around the Middle East, there have been signs of electronic interference on aircraft flying ahead of and around the strikes. “There are at least six new spoofing signatures in the Middle East,” says Jeremy Bennington, vice president of positioning, navigation, and timing strategy and innovation at technology firm Spirent Communications. “Hundreds of flights have been impacted. However, that decreased significantly over the weekend as flights have been canceled.”



Source link

Continue Reading

Tech

NCSC: No increase in cyber threat from Iran, but be prepared | Computer Weekly

Published

on

NCSC: No increase in cyber threat from Iran, but be prepared | Computer Weekly


In the wake of a major series of new US and Israel-led attacks on Iran and subsequent retaliatory strikes on Gulf states including Bahrain, Kuwait and the UAE, the UK’s National Cyber Security Centre (NCSC) has reassured British organisations that there is likely no significant change in the direct cyber threat posed by Iranian actors.

But that despite the attacks, Iranian state threat actors likely retain some ability to conduct cyber attacks, and more widely, there is a risk of collateral impacts – such as distributed denial of service (DDoS) attacks – originating from hacktivist groups sympathetic to Iran.

And, as the spreading conflict threatens to draw in the UK, the GCHQ-backed cyber agency said it this assessment was subject to change at short notice, and there was almost certainly a heightened risk of indirect cyber threat for any UK organisations with a presence in the Middle East.

“In light of rapidly evolving events in the Middle East, it is critical that all UK organisations remain alert to the potential risk of cyber compromise, particularly those with assets or supply chains that are in areas of regional tensions,” said NCSC director for national resilience, Jonathon Ellison.

“Today, the National Cyber Security Centre has published an alert outlining the current cyber threat to the UK and the practical steps organisations should take in response.

 “This includes engaging with our guidance to reduce the likelihood of falling victim to an attack where the cyber risk is heightened, and how critical national infrastructure organisations can prepare for and respond to severe cyber threats.

“Organisations are strongly encouraged to act now, following the recommended actions to prioritise and strengthen their cyber security posture,” said Ellison.

Global conflict

Although no European states have taken part in the initial strikes, Dennis Calderone, principal and chief technology officer (CTO) at Suzu Labs, said that European organisations still needed to pay attention.

“Iran’s cyber operations don’t stop at US borders, and the proxy groups operating on Iran’s behalf are even less predictable in their targeting,” said Calderone. “When the motivation is retaliation and the conventional military is gone, cyber operators cast a wide net.

“Since it appears that conventional military options are looking increasingly to be off the table, cyber is what Iran has left,” he added.

“And even with their own internet down, pre-positioned implants and operators based outside Iran can still execute. If you’re in energy, water, financial services, or defense, assume you’re a target. Start hunting for anomalous access in your environment now. Don’t wait for something to break.”

James Turgal, vice president of global cyber risk and board relations at Optiv, said that over the next 30 days or so, there will likely be a surge of cyber activity linked to Iran, including website defacements, DDoS attacks, doxxing and leaks, and disruptive intrusions designed to create symbolic impact and public fear. This will likely include influence operations.

Threat actors will likely opportunistically exploit vulnerabilities in unpatched, internet-facing systems, and take advantage of other cyber weaknesses, such as exposed VPNs, and badly-secured operational technology (OT) or industrial control systems (ICS).

Within 72 hours, at-risk organisations should move to lock down internet-facing exposures, verify they are patched and up-to-date, have removed or limited unnecessary remote admin surfaces, rotated any exposed credentials, and validated multifactor authentication on any remote devices, said Turgal. CNI operators should also review their OT and ICS segmentation and monitoring.

More widely, security leaders should take steps to protect user identities against potential intrusion, and ensure their infrastructure is hardened against DDoS attacks. 

Blended threat

Halcyon’s Cynthia Kaiser – who was previously deputy assistant director of the FBI’s cyber division, said she was already seeing increased activity in the Middle East, and calls to action from hacktivists, DDoS botnet operators, and ransomware gangs.

“Iran has a long track record of using cyber operations to retaliate against perceived political slights…. Tehran’s cyber playbook has been aggressive and evolving,” she said.

“Increasingly, ransomware is incorporated into these escalating operations. Last year, an Iranian national pleaded guilty to ransomware attacks that crippled Baltimore and other US municipalities, causing tens of millions in damages. Since at least 2017, Iranian operators have targeted US critical infrastructure … with ransomware campaigns that blur the line between criminal extortion and state-sponsored sabotage.”

In practice, Kaiser explained, Iranian cyber ops blend state sponsorship, personal profiteering, and outright criminal behaviour. For example, she said, financially-motivated hackers may attempt to monetise access gained through government-funded campaigns.

Like Moscow, she added, Tehran turns a blind – or at least indifferent – eye to criminal cyber ops against shared enemies such as the US, Israel and their regional allies.

“Having access to cyber criminals gives the government options. As Iran considers its response to US and Israeli military actions, it is likely to activate any of these cyber actors if it believes their operations can deliver a meaningful retaliatory impact,” said Kaiser.



Source link

Continue Reading

Trending