Connect with us

Technology

Bigscreen’s super light Beyond 2 headset adds optional eye-tracking

Published

on

Bigscreen’s super light Beyond 2 headset adds optional eye-tracking

Bigscreen has just revealed the Beyond 2, a custom-fit virtual-reality headset with a 116-degree field of view it claims is wider than the Meta Quest 3 and Valve Index. The wired headset weighs just 107 grams (~3.8 ounces) and starts at $1,019, but you’ll have to pay extra if you want eye-tracking capabilities.

The Bigscreen Beyond 2 is compatible with SteamVR base stations and comes with the same micro-OLED displays as its predecessor, offering a 5120 x 2560 resolution and up to 90Hz refresh rate. However, Bigscreen says the Beyond 2 has upgraded pancake optics offering “edge-to-edge clarity,” improved brightness, and less glare. It also lets you adjust the position of each lens separately, allowing it to match the distance between your pupils.

There’s also a Beyond 2e, which starts at $1,219 and tracks the movement of your eyes with “incredibly tiny camera sensors the size of a grain of sand.” This can come in handy if you want your virtual avatar in apps like VRChat to reflect your eye movement.

You can still use an iPhone XR or newer to create a 3D scan of your face, allowing Bigscreen to make a custom-fit face cushion. Alternatively, if you don’t have an iPhone, the Bigscreen Beyond 2 now offers a universal-fit Halo mount and cushion.

The Beyond 2 and Beyond 2e are available to order now with black, orange, and clear cover shells. Shipments are expected to arrive in June 2025.

Advertisement
Continue Reading
Advertisement
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Technology

AI could consume more power than Bitcoin by the end of 2025

Published

on

AI could consume more power than Bitcoin by the end of 2025

AI could soon surpass Bitcoin mining in energy consumption, according to a new analysis that concludes artificial intelligence could use close to half of all the electricity consumed by data centers globally by the end of 2025.

The estimates come from Alex de Vries-Gao, a PhD candidate at Vrije Universiteit Amsterdam Institute for Environmental Studies who has tracked cryptocurrencies’ electricity consumption and environmental impact in previous research and on his website Digiconomist. He published his latest commentary on AI’s growing electricity demand last week in the journal Joule.

AI already accounts for up to a fifth of the electricity that data centers use, according to de Vries-Gao. It’s a tricky number to pin down without big tech companies sharing data specifically on how much energy their AI models consume. De Vries-Gao had to make projections based on the supply chain for specialized computer chips used for AI. He and other researchers trying to understand AI’s energy consumption have found, however, that its appetite is growing despite efficiency gains — and at a fast enough clip to warrant more scrutiny.

“Oh boy, here we go.”

With alternative cryptocurrencies to Bitcoin — namely Ethereum — moving to less energy-intensive technologies, de Vries-Gao says he figured he was about to hang up his hat. And then “ChatGPT happened,” he tells The Verge. “I was like, Oh boy, here we go. This is another usually energy-intensive technology, especially in extremely competitive markets.”

Advertisement

There are a couple key parallels he sees. First is a mindset of “bigger is better.” “We see these big tech [companies] constantly boosting the size of their models, trying to have the very best model out there, but in the meanwhile, of course, also boosting the resource demands of those models,” he says.

That chase has led to a boom in new data centers for AI, particularly in the US, where there are more data centers than in any other country. Energy companies plan to build out new gas-fired power plants and nuclear reactors to meet growing electricity demand from AI. Sudden spikes in electricity demand can stress power grids and derail efforts to switch to cleaner sources of energy, problems similarly posed by new crypto mines that are essentially like data centers used to validate blockchain transactions.

The other parallel de Vries-Gao sees with his previous work on crypto mining is how hard it can be to suss out how much energy these technologies are actually using and their environmental impact. To be sure, many major tech companies developing AI tools have set climate goals and include their greenhouse gas emissions in annual sustainability reports. That’s how we know that both Google’s and Microsoft’s carbon footprints have grown in recent years as they focus on AI. But companies usually don’t break down the data to show what’s attributable to AI specifically.

To figure this out, de Vries-Gao used what he calls a “triangulation” technique. He turned to publicly available device details, analyst estimates, and companies’ earnings calls to estimate hardware production for AI and how much energy that hardware will likely use. Taiwan Semiconductor Manufacturing Company (TSMC), which fabricates AI chips for other companies including Nvidia and AMD, saw its production capacity for packaged chips used for AI more than double between 2023 and 2024.

After calculating how much specialized AI equipment can be produced, de Vries-Gao compared that to information about how much electricity these devices consume. Last year, they likely burned through as much electricity as de Vries-Gao’s home country of the Netherlands, he found. He expects that number to grow closer to a country as large as the UK by the end of 2025, with power demand for AI reaching 23GW.

Advertisement

Last week, a separate report from consulting firm ICF forecasts a 25 percent rise in electricity demand in the US by the end of the decade thanks in large part to AI, traditional data centers, and Bitcoin mining.

It’s still really hard to make blanket predictions about AI’s energy consumption and the resulting environmental impact — a point laid out clearly in a deeply reported article published in MIT Technology Review last week with support from the Tarbell Center for AI Journalism. A person using AI tools to promote a fundraiser might create nearly twice as much carbon pollution if their queries were answered by data centers in West Virginia than in California, as an example. Energy intensity and emissions depend on a range of factors including the types of queries made, the size of the models answering those queries, and the share of renewables and fossil fuels on the local power grid feeding the data center.

It’s a mystery that could be solved if tech companies were more transparent

It’s a mystery that could be solved if tech companies were more transparent about AI in their sustainability reporting. “The crazy amount of steps that you have to go through to be able to put any number at all on this, I think this is really absurd,” de Vries-Gao says. “It shouldn’t be this ridiculously hard. But sadly, it is.”

Looking further into the future, there’s even more uncertainty when it comes to whether energy efficiency gains will eventually flatten out electricity demand. DeepSeek made a splash earlier this year when it said that its AI model could use a fraction of the electricity that Meta’s Llama 3.1 model does — raising questions about whether tech companies really need to be such energy hogs in order to make advances in AI. The question is whether they’ll prioritize building more efficient models and abandon the “bigger is better” approach of simply throwing more data and computing power at their AI ambitions.

Advertisement

When Ethereum transitioned to a far more energy efficient strategy for validating transactions than Bitcoin mining, its electricity consumption suddenly dropped by 99.988 percent. Environmental advocates have pressured other blockchain networks to follow suit. But others — namely Bitcoin miners — are reluctant to abandon investments they’ve already made in existing hardware (nor give up other ideological arguments for sticking with old habits).

There’s also the risk of Jevons paradox with AI, that more efficient models will still gobble up increasing amounts of electricity because people just start to use the technology more. Either way, it’ll be hard to manage the issue without measuring it first.

Continue Reading

Technology

Windows PCs at risk as new tool disarms built-in security

Published

on

Windows PCs at risk as new tool disarms built-in security

All modern Windows PCs come with Microsoft Defender built in. For the unaware, this tool is Windows’ native antivirus. 

Over time, it has matured into a reliable security tool capable of blocking a wide range of threats. However, a tool called Defendnot can shut down Microsoft Defender completely, without exploiting a bug or using malware. It simply convinces Windows that another antivirus is already running.

The implications are serious. This tool does not break into the system or use advanced code injection. It uses Windows features the way they were designed to be used. And that makes the problem harder to detect and harder to fix.

Join the FREE “CyberGuy Report”: Get my expert tech tips, critical security alerts and exclusive deals, plus instant access to my free “Ultimate Scam Survival Guide” when you sign up!

Windows software on a PC (Kurt “CyberGuy” Knutsson)

Advertisement

The tool works by pretending to be an antivirus

Windows is built to avoid running multiple antivirus products at once. When a third-party antivirus registers itself, Windows disables Microsoft Defender to prevent conflicts. Defendnot exploits this system using an undocumented API that security software uses to communicate with the Windows Security Center.

The tool registers a fake antivirus that appears legitimate to the system. It uses a dummy DLL and injects it into Task Manager, a trusted Windows process. By operating inside this signed process, Defendnot avoids signature checks and permission blocks. Once the fake antivirus is registered, Windows disables Microsoft Defender without warning or confirmation.

WINDOWS 10 SECURITY FLAWS LEAVE MILLIONS VULNERABLE

No security alert is shown to the user. No visible changes are made to indicate that the system is unprotected. Unless someone checks manually, the machine remains open to attacks with no real-time protection running.

The tool also includes options to set a custom antivirus name, enable logging and configure automatic startup. It achieves persistence by creating a scheduled task that runs whenever the user logs in.

Advertisement
person typing on laptop

Windows software on a laptop (Kurt “CyberGuy” Knutsson)

WINDOWS DEFENDER VS ANTIVIRUS SOFTWARE: FREE PROTECTION FALLS SHORT

From GitHub takedown to a fresh build

Defendnot is based on an earlier project called No-Defender. That project used code from an actual antivirus product to fake registration. It gained attention quickly and was removed after a copyright complaint from the vendor whose code had been reused. The developer took the project down and walked away from it.

With Defendnot, the creator rebuilt the core features using original code. This version avoids copyright issues and uses a new method to achieve the same effect. It does not rely on another antivirus or third-party binaries. It was written from scratch to demonstrate how simple it is to manipulate Windows security from inside the system.

Microsoft Defender currently flags the tool as a threat. It detects and quarantines it under the name Win32/Sabsik.FL.!ml. However, the fact that it works at all points to a weakness in how Windows handles antivirus registration and trust.

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

Advertisement
laptop on a desk

Windows laptop showing the home screen (Kurt “CyberGuy” Knutsson)

DOUBLECLICKJACKING HACK TURNS DOUBLE-CLICKS INTO ACCOUNT TAKEOVERS

6 ways to protect yourself from malicious programs

While Defendnot is a research project, there’s a chance that similar tools are already out there and could be used to compromise your PC. Here are a few tips to help you stay safe:

1. Use strong antivirus software: Even with regular updates, Windows systems can be left exposed by tools like Defendnot that silently disable built-in defenses. A strong third-party antivirus with real-time protection and frequent updates provides essential backup security. Look for solutions with real-time protection and frequent updates to tackle emerging threats. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.

2. Limit exposure: Many exploits rely on user interaction, such as clicking a shady link, downloading a compromised file or mounting an untrusted virtual disk. Stick to reputable websites, avoid opening unsolicited email attachments and use a browser with built-in security features (like Microsoft Edge or Chrome with Safe Browsing enabled).

3. Avoid running unexpected commands: Never paste or run commands (like PowerShell scripts) you don’t understand or that were copied from random websites. Attackers often trick users into unknowingly running malware this way.

Advertisement

4. Keep your software updated: Regularly update your operating system, browsers and all software applications. Updates often include patches for security vulnerabilities that malware can exploit.

5. Use two-factor authentication (2FA): Enable 2FA on all your accounts. This adds an extra layer of security by requiring a second form of verification, making it harder for attackers to gain access even if they have your password.

6. Invest in personal data removal services: Even with strong device security, your personal information may still be exposed online through data brokers and people-finder sites. These services collect and publish details like your name, address and phone number, making you an easier target for identity theft or phishing. Automated data removal services track down these sites and submit removal requests on your behalf, helping to reduce your digital footprint and increase your online anonymity. While they can’t erase every trace of your information, they make it significantly harder for attackers to find and exploit your personal data, which saves you time and reduces unwanted spam in the process.

While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here.

Get a free scan to find out if your personal information is already out on the web.

Advertisement

RELENTLESS HACKERS ABANDON WINDOWS TO TARGET YOUR APPLE ID

Kurt’s key takeaway

Defendnot points to a bigger issue with how Windows handles security. It takes a feature meant to prevent software conflicts and turns it into a way to completely disable protection. The system assumes any registered antivirus is legitimate, so if attackers can fake that, they get in without much resistance.

We often think of security as blocking the bad and trusting the good. But this case shows what happens when that trust is misplaced. Defendnot doesn’t sneak past Windows defenses. It walks right in using valid credentials. The solution isn’t just more patches or stronger malware signatures. What we need is a smarter way for systems to tell what is actually safe.

Do you think companies like Microsoft need to rethink how Windows handles antivirus registration and trust, given that tools like Defendnot can so easily disable built-in protections without using malware or exploiting a bug? Let us know by writing us at Cyberguy.com/Contact.

Advertisement

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you’d like us to cover.

Follow Kurt on his social channels:

Answers to the most-asked CyberGuy questions:

New from Kurt:

Advertisement

Copyright 2025 CyberGuy.com. All rights reserved.

Continue Reading

Technology

A Kaiser Permanente systems outage has pharmacies relying on pen and paper

Published

on

A Kaiser Permanente systems outage has pharmacies relying on pen and paper

Healthcare company Kaiser Permanente is dealing with a system outage that is forcing its hospitals and pharmacies to fill out prescriptions with pen and paper — and is slowing down services at other parts of the company, too.

“Kaiser Permanente is currently experiencing network interruptions, at one of our data centers, which is impacting some of our applications,” Kaiser Permanente spokesperson Kathleen Campini Chambers says in a statement to The Verge. “All of our clinical facilities are operational. However, members may be facing delays in certain services such as lab, radiology, and pharmacy online and in our facilities. We deeply apologize for the inconvenience. Our technical teams are working to resolve the issue as quickly as possible. Members can go to kp.org for updates.“

The company is also showing alerts on its regional websites, including for Northern California and Oregon / SW Washington. “At this time, you may not be able to access some features on our site, including e-visits, billing, message center, and records,” Kaiser Permanente says.

One Verge staffer saw the problems firsthand today while trying to get a prescription filled at a Kaiser hospital pharmacy. They said all the pharmacy’s systems were down, including payment terminals, and that the pharmacists had to fill out a point-of-sale form to fill the prescription. Staffers at the pharmacy warned about long wait times, saying it could take an hour to fill a simple prescription.

A thread on Reddit also includes reports of issues from places like Southern California and Maryland. Kaiser Permanente has also been replying to users on X, saying that it is “aware of the system outages” and that it is “working to restore services as soon as possible.”

Advertisement

Update, May 28th: Added statement from Kaiser Permanente.

Continue Reading

Trending