Organizer
Gadget news
SmartThings Station review: Is Matter worth your money?
9:30 pm | April 18, 2023

Author: admin | Category: Computers Gadgets | Tags: | Comments: Off

One-minute review

A groundbreaking collaboration between Google, Samsung, Apple, Amazon, and a whole mess of other tech companies, the Matter standard is meant to unravel the complexity of smart homes, one Thread-connected device at a time. And the SmartThings Station is Samsung’s first big entry in the Matter world. 

The Station is a kinda-clunky smartphone charger with a Matter hub inside it, to connect all your gadgets and unlock the smart-home coolness you’ve been promised: The Station will turn off the lights when you go to bed! It’ll find your missing keys! It’ll make everything work, seamlessly and simply! All for just $60 bucks! Well, $80 if you want the charging brick … and you do.

That said, the Matter standard (and the SmartThings Station by extension) are a promise based on you upgrading all your stuff, or better yet, simply starting from scratch with new gear. And the device itself does little to alleviate the clutter confusion most consumers probably have when it comes to hubs. Do I need one? Wait, I have one already? And I need another? Which spec or protocol am I using anyway? 

The Station is simple enough - and smart enough, for that matter. But like a teenager’s bedroom, I’m afraid the smart home may remain a cluttered mess for now.

SmartThings Station review: price and availability

  • List price: $79.99
  • Available only in the US

The is available to buy for a list price of $79.99 and is available only in the United States. It can be bought direct from the Samsung website. You'll have a choice of color to choose from; it's available in black or white.

SmartThings Station review: Specs

SmartThings Station review: Design

The Station is a black plastic square with rounded edges, about an inch tall -- sort of like a stack of drink coasters. A dark gray top is recessed a tiny bit and contains a single button in the top right corner that can activate different features depending on whether you press, long press, or double press it. There’s a set of colored LEDs on the right front edge to indicate connectivity and charging status and a USB-C connection on the back. And that’s about it.

Because it has extra smarts in it that any other charger lacks, it also has a fan to keep itself cool. I didn’t notice the gentle whir at all, but somehow my wife said she heard it on my nightstand from her side of the bed. Pay her no mind; it’s not really audible.

The $60 version of the Station lets you BYO your charger, and you've probably got something around that'll power it via USB-C. But to get super-wicked-fast charging from your Galaxy phone (you're using this with one, right?), you'll want to drop an extra $20 to get Sammy's. 

For a phone charger, the Station is decidedly clunky, especially when compared with the $10 Tozo W1 wireless charger I bought recently, a wisp of a disc with a grippy rubber top. (Don’t like the Tozo? We’ve got a great list of the top chargers on the market, which come in all sorts of shapes and sizes.) But keep in mind, this is no mere charger, hence the circa $80 price tag. The Station has a secret: Matter. We’ll get to that in a second.

Design score: 2 out of 5

On the left, the oh-so thin Tozo. On the right, the SmartThings Station

On the left, the oh-so thin Tozo. On the right, the SmartThings Station. (Image credit: Future / Jeremy Kaplan)

Let's talk about hubs

The core raison d’etre of the Station is also the main problem with smarthomes today: hubs. (And you’re forgiven if the word alone makes you want to put a pillow over your head.) Some smart home devices connect directly to an app on your phone through Wi-Fi or some other protocol, including the Nest Learning Thermostat and many popular door locks. Others come with a hub that facilitates communication out to the world.

Most people have hubs without thinking twice about them: An Amazon smart speaker or a Google Nest hubs or the Apple HomePod, which allow you to use voice assistants to speak to your devices. This is handy, but of course, you can likely only use the one assistant. Hubs are necessary.

The ABCs of IoT

Matter: The Station supports Matter fully and acts as a hub.

Thread: An IoT communication standard and a key part of Matter. The Station embraces it.

Z-Wave: The OG smart home communication standard. Unsupported. Yep.

Zigbee: The other big IoT standard, Zigbee is fully supported.

SmartThings: Samsung’s own smart home tech, supported completely, of course.

I’ve got two other hubs in my home, one for the SimpliSafe home security system and a second for my EufyCam 2 security cams (the best home security camera system on the market). That’s right, I have two different security systems with two different hubs that speak different languages. And neither of them works well with Google. And neither speaks Matter, for that matter. 

This, in a nutshell, is the challenge of today’s smart home: too many hubs, too many standards, too much confusion. And into this space steps … another hub. I’m sorry too. Don’t blame me.

Hubs function essentially as a bridge to the outside world. Think of the Matter standard as the language your devices speak, regardless of whether they’re talking on the phone or DMing or on FaceTime, metaphorically speaking. Hubs allow that conversation to reach outside of your house, so you can use your devices from anywhere in the world, via the SmartThings app. As I said, it's a necessary thing.

SmartThings Station review: performance

Yes, the Samsung Station is a hub for Matter, but it’s also a charger, and a darn good one, supporting “super-fast” wireless charging on Samsung phones. My Samsung Galaxy S22 acknowledged the Station and the 15 watts of juice it supplied with a grin and smile. Other devices won’t support those speeds, but they should charge at regular wireless speeds -- that is to say, slowly. And as with all charging thingies, you’ll have to position your phone just right or you’ll wake up with 22% battery life, as I did this morning. Sigh.

The Station can locate your devices as well through a service called SmartThings Find, which is useful in the morning when you’re scrambling to find keys or that cell phone that’s walked off. Swipe between devices on the app, then press the tile's button to locate them. You can also activate this feature through a physical button on the Station itself, which otherwise didn’t feel super handy to me.

The SmartThings station on a desktop

(Image credit: Future / Jeremy Kaplan)

Setting up the Station is a snap. Download the Samsung SmartThings app on either Android or iOS, plug the device in and your phone will automatically find it. If not, just tap the small plus sign to start things rolling. Voila. Next up, connect your smart home devices, and if you’ve already got SmartThings set up, you’re way ahead of the game. If not, it’s simple enough to add gear to Samsung’s app.

Matter is intended to smooth out this process, so to test it out, I screwed a Nanoleaf Essentials Matter Smart Bulb (model N67) into a kitchen light. The N67 is a brand new smart bulb that can change colors and temperatures thanks to the Nanoleaf app.

Setting up the Nanoleaf N67 using SmartThings and Matter

Setting up the Nanoleaf N67 using SmartThings and Matter should have been a snap. It didn't really work, however. (Image credit: Future / Jeremy Kaplan)

I added the N67 first to the Nanoleaf app. Once there, the SmartThings app detected the device and began registering it to my Samsung account. It … well, didn’t work. The app hung for several minutes before telling me “Something went wrong. Error code 39-511.” It did this twice in a row before I gave up in frustration.

Several days later, new firmware was pushed to the bulb, updating it from 3.2.0 to 3.5.0. Following the update, I noticed that the bulb was available in SmartThings. Had it always been there? What was the error? Is it registered to my Samsung account? What does that even mean? Regardless, once over the hump I could control the bulb flawlessly from either app. By clicking the “Share with other services” menu in SmartThings, I was able to share the bulb and its features to my Google Nest Hub, which is also a Matter hub. This worked remarkably well, but I don’t expect anyone to ever take advantage of it. Who has two Matter hubs?

Setting up Routines

The real power of connected devices lies in automation -- tying together multiple devices to change the setting, set the mood, or whatever. And frankly, I remain shocked that modern office buildings don’t do more in this regard. If you’re like me, you walk into conference rooms on a daily basis carrying both a smartphone and a laptop; Why those devices don’t interact with the room itself is beyond me. Can’t they automatically log into a Zoom room or Google Hangout, turn on the lights, enable the camera (and point it at me), and log into whatever conference is configured to start? Or set the conference room status to “occupied” or “lunchtime beer tasting” or something?

But forget the office: SmartThings Station can do that for your home, tied to the time of day, home status, or several other variables that make this a very powerful feature. Drop a phone on it to charge and you can automatically trigger a routine -- turn the music to something innocuous, set the lights to mellow yellow, whatever.

Through SmartThings, I set a routine to trigger after 10pm if I set my phone on the charger for more than 1 minute. Under those specific circumstances, the routine turned off the lights and set things to away mode. It was handy indeed, and I could see this being quite useful.

Performance score: 3 out of 5

Should you buy the SmartThings Station?

Buy it if ...

Don't buy it if ...

SmartThings Station review: also consider

This is a pretty unique proposition from Samsung but if you wish to create an ecosystem with smart devices, or need a new phone to charge on the SmartThings Station here are a couple of products to consider...

How I tested the Samsung SmartThings Station

I spent a month with the SmartThings Station to ensure that I understood the Matter ecosystem and how it worked. Testing the phone charger simply as a charger -- including the Find My Device features and so on -- was straightforward enough with my Galaxy S22 Ultra, but that's really only half of the product. 

My New York City apartment lacks the cornucopia of smart home devices that suburban dwellers use, however, such as connected doorbells and security systems. So I focused my testing on the brand new Nanoleaf Essentials Matter Smart Bulb (model N67). I tested the pair over the span of two weeks, unplugging the Station, adding the Bulb to my other Matter hub, and experimenting with Routines. The more energy you invest in this feature, the more value you'll get from your purchase. But that kind of flies in the face of Matter's plug-and-play attitude, doesn't it?

First reviewed April 2023

Read more about how we test

GoodAccess business VPN review
9:25 pm |

Author: admin | Category: Computers Gadgets | Tags: | Comments: Off

GoodAccess VPN is an essential static IP provider, designed specifically for businesses. Based in the Czech Republic, it empowers small business owners to securely access essential resources from any location while allowing administrators to customize the settings via a web-based dashboard, as well as monitor for suspicious visitors and potential risks. GoodAccess aims to offer the benefits of a zero-trust model for remote access purposes wherever you and your workers find yourselves. 

GoodAccess is the perfect solution for small and medium-sized businesses, boasting the speed of implementation as its standout feature. With the promise to create a robust virtual VPN moat around your business applications and assets and attractive pricing plans plus a free trial, why wouldn't you choose GoodAccess?

Let’s check if it delivers on its bold promises.

GoodAccess

GoodAccess pricing plans (Image credit: GoodAccess)

Plans and pricing

There is something for everyone with the plethora of pricing plans GoodAccess offers to its customers. The Starter plan is now free forever, covering the basics with their “basic secure shield” functionalities. This is a great starting point for a small group of freelancers who are looking to secure their startup network. 

Moving on, we have the Essential plan that costs $9 per user per month, but requires a minimum of five users. In addition, for each dedicated gateway you will have to pay an additional $39 per month. 

The Premium plan costs $14 per month per user and also has a minimum required amount of users set at five. It offers much more than the previous two plans and is ideal for cloud businesses. 

Finally, the Enterprise plan is for larger organizations, with all details to be discussed with the sales department of the company. 

If you opt for annual billing, you will be able to save 20%, which is a welcome sight for firms looking to lock in a long term partner.

All things considered, it’s a reasonable value for money if we compare GoodAccess with its more famous competitors.

Business VPN

GoodAccess provides a static IP address to protect your business systems (Image credit: Good Access)

Security features

GoodAccess is your one-stop shop for unbeatable business security features - at a fantastic price. Its SASE (Service Access Service Edge) solution gives your online team the peace of mind that comes with knowing they can access all your cloud-based systems securely. It features 2FA/MFA (two-factor and multi-factor authentication) for an added layer of protection for logins, as well as SSO compatibility with Google, Azure AD, Okta, SAML, Active Directory, or LDAP. On top of that, its encryption protocols (IKEv2 and OpenVPN) offer robust 256-bit security. Plus, it's IPv4-only and has no DNS leaks, while port-forwarding is enabled too.

GoodAccess keeps your team members in check with its employee monitoring and access logging. You'll be able to get a clear view of how well you comply with GDPR, SOC2, or HIP to ensure granularity of access to only necessary materials and areas of the network. 

Whitelisting your dedicated IP ensures that all of your online business systems can be trusted, eliminating the risk of employees being barred from shared online resources. Furthermore, personal VPNs provide additional safety measures such as a kill switch, which suspends internet activity should the VPN connection drop; adding this feature to GoodAccess would significantly bolster its security.

All in all, GoodAccess delivers the goods when it comes to security features, bringing it closer to more premium packages at a lower price.

Management features

GoodAccess packs several management tools built around the idea of user-friendliness and accessibility. For starters, you can manage gateways by instantly deploying a private gateway with a static IP for your employees. You can choose these among more than 33 locations across the globe. Using multiple gateways should help you in situations when you need backup or faster connection speeds.

Managing access is done by creating special access cards that can authorize it for specific resources and systems for individual employees or groups. You can easily assign these by the departments, granting different access authorization to, for instance, your marketing team as opposed to your IT personnel.

GoodAccess has really thought of everything, with 16 different application integrations available for businesses using SaaS apps such as WordPress, Google Cloud, Magento and more. Not only do these integrations set up a secure, private and encrypted tunnel from your app to your endpoint, but there is also copious documentation on how to implement each one. On top of that, you can even setup a single-sign-on provider such as Okta, Google or Azure, making GoodAccess a great choice for those wanting the extra protection or those that have already made the decision to use SSO as their main authentication method.

Business VPN

The GoodAccess control panel is designed for clear, easy use (Image credit: Sambohyb)

Interface

GoodAccess is designed with convenience in mind. Users can quickly view the active gateway and its associated IP address at the top, followed by a large button to enable the VPN connection. The systems configured by the team admin are listed below. Meanwhile, the options menu in the top left corner offers the chance to alter settings, read the terms of service or contact customer support.

The admin dashboard is a bit more intricate, as it allows for a tailored experience throughout the whole organization. Here, a complete overview of all members, gateways, systems and further options is available, each menu item is dedicated to a specific feature and featuring its own unique look.

Its control panel is dominated by an accessible and clean interface and a responsive dashboard that will help you get the most out of it in a short time. Navigating its buttons and sections goes quite smoothly and, even more importantly, intuitively. This is no small feat if you consider that you do not want to have your staff run in fear when presented with all the options hosted by this system.

All team members can be easily invited to be made a member of individual groups, with a tag-based system helping you filter them out subsequently based on the changing circumstances in the field.

The same level of user-friendliness is provided for the interface used to manage integrations and downloads.

Business VPN

You can send a message to Samohyb via the GoodAccess website (Image credit: Sambohyb)

Support and customer experience

The GoodAccess website's contact section features the company's address, and if you need to get in touch with the staff, you can fill out the short form provided. Alternatively, you can schedule a free online session with the GoodAccess Guru and address any initial installation problems, such as whitelisting or plugin issues. Furthermore, customers (especially Enterprise customers) can access 24/7 help through live chat or IT ticketing system. On their website, GoodAccess also provides customer reviews under the References tab.

On the GoodAccess website, Samohyb states that its VPN solutions are used by over 10,000 individuals, and over 1,000 teams. Despite this, it’s difficult to source many  customer reviews.

GoodAccess provides some customer feedback on its website, under References. There’s overall praise for GoodAccess’ user-friendly control panel, its low latency (ability to process lots of data quickly), strong encryption, and easy-to-use access control settings.

We sourced two customer reviews from Capterra and both were positive about the overall user-friendliness, affordability, and reliability of GoodAccess. Although a problem with initial whitelisting is mentioned, it’s stated that this issue was quickly resolved with the help of GoodAccess Guru.

The competition

Compared with the starting price per user per month of NordLayer, GoodAccess’ equivalent is cheaper. However, NordVPN's offering provides security features GoodAccess lacks, such as a VPN kill switch and two-factor authentication.

Like GoodAccess, Encrypt.me is a VPN service that’s good for small businesses. It’s easy to use and offers similar features, such as a free trial and accessibility across all devices. That said, Encrypt.me notably offers more server locations—over 70 across 40 countries.

Final verdict

Small businesses looking to invest in a VPN service for their employees should definitely consider GoodAccess as a great starting point. With a fixed monthly fee that covers multiple users, it represents  a cost-effective option for any organization. On the other hand, larger companies may benefit more from NordVPN Teams, a competing solution with additional features. Nevertheless, GoodAccess provides a free trial, so your business can assess the service before signing up for a monthly or yearly plan.

Larger enterprises should do well to check out more expensive VPN packages with more robust sets of advanced features.

For businesses on a shoestring budget or those that prefer to save on security, it’s an affordable option that does not feel like one at any time.

We've also highlighted the best business VPN

Google BeyondCorp review
9:10 pm |

Author: admin | Category: Computers Gadgets | Comments: Off

In 2009, a cyber attack known as Operation Aurora spurred Google to take drastic measures and reassess their security protocols. The threat actor, affiliated with China’s People’s Liberation Army, targeted the Gmail accounts of human rights activists in various countries, leading Google to withdraw from the China market. 

In response, Google developed BeyondCorp, a comprehensive Zero Trust network architecture that shifted the perimeter from the network to individual users, thereby replacing the company's traditional VPN-based approach to remote access. Over the decade that followed, BeyondCorp evolved into a complete, secure access control system, protecting both on-premises and remote users' access to Google resources.

Google BeyondCorp Enterprise is a zero-trust and subscription-based security solution provided by Google. It is designed to provide easy and secure on-premise and cloud-based access to valuable corporate applications. Yes, riding on the zero-trust bandwagon is hardly a surprise for Google, considering its pioneering work on this model back in the early 2000s.

Sounds good so far? Let’s see how it works in practice.

Perimeter 81 is a Forrester New Wave™ ZTNA Leader 

Ditch your legacy VPN hardware and automate your network security with ZTNA.  Secure remote access from anywhere with just a few clicks. Onboard your entire organization in minutes, not days. Learn why Perimeter 81 is one of TechRadar's choices for the best ZTNA security providers. Download the report.

 Google BeyondCorp security features 

Google BeyondCorp is a revolutionary security model that has completely transformed the way companies defend their data and applications. With its zero-trust approach, it never trusts any user or device, regardless of if they are inside the corporate network. This paradigm shift is a huge divergence from traditional security models that rely on the trustworthiness of users and devices inside the network. 

Google BeyondCorp ensures that only legitimate users and devices can access company applications and data by using multi-factor authentication. Furthermore, it goes a step further by providing advanced threat detection capabilities. This system constantly monitors and analyzes user activity, searching for any suspicious behavior or signs of a possible breach. If risks are identified, an alert will be sent out with necessary measures being taken to stop further damage. Ultimately, Google BeyondCorp is an effective tool for organizations to protect their data and applications from any internal or external threats.

At the heart of this model is the Zero Trust concept in which nothing is assumed when verifying one’s identity. This means that whenever an employee tries to connect to protected services or assets BeyondCorp will not use the network from which the access request has been made as a reference point for security verification. Instead, it will rely on the specific context relevant to that user and their device. The final outcome should be comprehensive insulation from the cybersecurity risks such as data leakage, malware and phishing attacks, theft of corporate information, etc.

The BeyondCorp solution employs several different security features to ensure users are protected from credential theft and accidental exposure. This is done by granting access only when both a device certificate and user credentials are presented. There is also the On-premises Connector which enables Google Cloud-based Identity-Aware Proxy traffic to travel to and from virtual machines and applications outside the Google Cloud. 

Moreover, the Threat and Data Protection Services provides security intelligence and helps prevent data leakage, malware, and malicious sites. Plus, with the Endpoint Verification feature, administrators can generate a list of devices and set security requirements for each one. Additionally, with the Access Context Manager, custom zero-trust access policies can be quickly created and deployed, with access limits depending on the credential strength and time. 

Rounding out the supported security features are application-based segmentation, one-time passwords, SMS codes, 2SV keys, push notifications, pre- and post-login risk assessments, SSL certificate management, global load balancing, and DDoS protection. All these features are perfectly integrated with the popular Chrome browser, providing users with an agentless and proxy-less solution.

Management features 

The BeyondCorp security model is an effective way to protect your organization's valuable data - and it all starts with the four key pillars of its design that extend into its management features.

Pillar One: Device identity requires all users’ devices to be registered in the system, with up-to-date security patches and a strong cryptographic key for extra security.

Pillar Two: User database and SSO ensures that changes in the organization's teams and roles are always reflected in the access system.

Pillar Three: Removing trust from the network and always-on access control means that each connection is encrypted and authenticated, no matter where it's from.

Pillar Four: An internet-facing access proxy is essential to ensure that only users with verified identities and trusted devices can access the organization's services.

BeyondCorp puts these four pillars together to create a comprehensive, secure system, so you can rest assured your data is safe. The management of these pillars can be done using the Chrome browser, in an easily accessible and oddly familiar way.

Access policies can be managed and controlled via the administration console whenever the users sign into the Chrome browser from any platform. The management of their accounts can be done via Chrome Enterprise, Google Workspace, or Cloud Identity.

The Endpoint Verification feature is a great tool for administrators that allows them to gain valuable insights on the devices from which corporate assets are being accessed. With this data, you can tailor access policies such as password management, safe browsing, and extension management. Moreover, you can also enforce BeyondCorp Enterprise threat and data controls at the profile level to protect users from malicious websites, monitor access to sensitive data, and submit suspicious files for analysis. Additionally, security event reporting for managed user profiles provides you with information about the activities of high-risk users, data protection, and threat reports.

Google BeyondCorp interface 

Finding your way around with Google BeyondCorp should be easy, at least if you are familiar with any of Google’s products, such as the Chrome browser.

Upon signing in to a new profile, accessing protected profiles via Chrome is as intuitive as it gets. In line with predefined access policies, end users may be asked to submit additional information when signing on, including two-factor authentication. What follows involves just taking note of provided instructions for the completion of the Google sign-in process.

The Google BeyondCorp interface is the ideal solution for efficient user access management, combining user-friendliness, intuitive design and powerful features. Whether accessing from any location, device, or internet connection, the interface offers granular access control for admins to tailor permissions for each user, group or device. In addition, real-time monitoring enables admins to detect and respond to any suspicious behavior. Detailed logs and reports make it easy to trace user activity and stay in line with company policies and regulations. Ultimately, the Google BeyondCorp interface simplifies and secures user access control.

Pricing 

When it comes to Google BeyondCorp, one size definitely does not fit all. Tailored to suit the specific needs of organizations, this powerful platform provides flexible pricing plans that accommodate different budgets and company sizes. With the free trial period, new users can try the service out before opting for a paid subscription. 

The Enterprise plan starts at $6 per user per month, while the Essentials plan starts at $4 per user per month. However, keep in mind that there is a minimum contract cost for Enterprise at $14,000 and $10,000 for Essentials. On top of that, Google offers a custom quote for companies which aim to have a custom solution for their business.

The easiest way to decide if six dollars is too much for what is being offered here is to check the list of both paid and baseline features here

Final verdict 

The renowned Google BeyondCorp Enterprise provides an effortless, swift and affordable route to achieve a zero-trust model implementation. Minimizing security incidents, thwarting malicious assaults and minimizing your exposure are just a few of the benefits of this renowned option. Not to mention, Google's trusted brand and seamless integration of the Chrome browser makes this a highly desirable choice. While Google devotees will find the price of entry to be more than suitable, others who want to test out the zero-trust approach will be delighted with what BeyondCorp Enterprise can do for their security.

Cooler Master CK720 review: CM’s excellent enthusiast entry
9:00 pm |

Author: admin | Category: Computers Gadgets | Comments: Off

Cooler Master CK720: Two-minute review

I’m sure I’m not alone when I say that the top gaming keyboard manufacturers really need to throw their hats in the keyboard modding ring. They have been but the going was slow, with Razer releasing its Razer PBT keycap upgrade sets and coiled cables back in 2020, Roccat just rolling out the first keyboard in its popular Vulcan line with removable keycaps in 2022, and HyperX only launching its customized keycaps this year.

Luckily, some of the best gaming keyboard brands are starting to pick up the pace, especially with the release of the Cooler Master CK720, CM’s first foray into the hot-swappable, mod-friendly enthusiast keyboard game. It isn’t the first one to get there, with the Corsair K70 Pro Mini Wireless hitting the shelves a few months earlier. 

However, it is a promising early attempt that makes me look forward to what comes next. And, I probably would rate it as one of the best mechanical keyboards for beginners who want to get into keyboard modding

Cooler Master CK720 on a blue mat

(Image credit: Future / Michelle Rae Uy)

This is a 65% keyboard, which in my opinion is the perfect compromise. It keeps some of the vital dedicated keys – like the arrow keys – while maintaining a small footprint that’s ideal for smaller or nomadic setups. And, while it isn’t the lightest I’ve tested, it won’t be a struggle lugging it around in your backpack if you want to bring it to the office, even if that office is at a resort in Hawaii.

Though it's a mostly simple-looking keyboard, many of the Cooler Master CK720’s parts are customizable or replaceable. It’s hot-swappable, meaning you can pull out the existing switches with a switch puller and replace them with other switches. 

Naturally, its PBT doubleshot keycaps, available in black and white, are removable and replaceable as well; so is its cable so you can switch it out to your favorite coiled cable as I did. In fact, so is its top plate, although removing that one – you have to pull a small, hidden lever to loosen and remove it – can be such a pain it’s almost not worth it. Cooler Master currently does not sell top plates in different colors and designs anyway.

Image 1 of 3

Cooler Master CK720 on a blue mat

(Image credit: Future / Michelle Rae Uy)
Image 2 of 3

Cooler Master CK720 on a blue mat

(Image credit: Future / Michelle Rae Uy)
Image 3 of 3

Cooler Master CK720 on a blue mat

(Image credit: Future / Michelle Rae Uy)

Remove the top plate, however, and you’ll be able to access the rest of the keyboard parts. Not that you’d want to as CM has taken pains to make it a well-built board. It’s fitted with the brand’s new pre-lubed stabilizers as well as two separate silicone dampening pads (one on the PCB and one on the bottom cover).

There’s a three-way multi-function knob, also known as a rotary encoder, at the top right corner that works with media controls by default but whose functions can be remapped on the MasterPlus software. You can use it to cycle through RGB lighting effects, as navigation keys, to access macros, and more.

While we’re on the subject, installing MasterPlus opens the keyboard up to a whole world of customizations. Being a mini keyboard, it already comes with on-the-fly shortcuts, but the software just gives you a whole lot more control over your per-key lighting, remapping, and macros. I highly recommend downloading it.

Without it, the Cooler Master CK720 is already an incredible gaming keyboard. Its standard 1,000Hz polling rate was more than enough to keep up with games like Cyberpunk 2077 and battling rot monsters and bosses in Kena: Bridge of Spirits during my testing. Plus, I didn’t experience any latency due to its wired connectivity.

Cooler Master CK720 on a blue mat

(Image credit: Future / Michelle Rae Uy)

As great as it is for gaming, it’s also an incredible keyboard for productivity. In fact, as far as enjoying a satisfying typing experience, this is one of the best keyboards I’ve ever used. That’s thanks in part to the Kailh Box V2 red switches it’s fitted with (both white and brown switch variants are also available) as well as due to the stabilizers inside. As a result, those keys not only deliver that satisfying linear feel, but are also very smooth and stable.

Mech keys, especially clicky ones, tend to be loud, but the addition of the two dampening pads here are somewhat successful at minimizing the noise. While I have used much quieter keyboards, the CK720 isn’t too bad either. I just wish that my linear red version delivered a more thocky sound, but what I’m getting is something between that and a clacky sound. That’s not a deal-breakers per se, but if you’re more discerning about your keyboard’s sound profile, you’ll want to do a sound test first.

Cooler Master CK720: Price & availability

  • How much does it cost?  $115.99 / £93.07 / AU$172.67 
  • When is it available? Available now
  • Where can you get it? Available in the US, UK, and Australia

The Cooler Master CK720’s price tag is about on par with many enthusiast mech keyboards in its class. It’ll set you back $115.99 / £93.07 / AU$172.67, which is probably more than most people would pay for a keyboard but is just about what most enthusiasts would spend on a new keyboard to add to their collection.

In the best mini gaming keyboards realm, however, it’s actually cheaper than the competition. The wireless Razer BlackWidow V3 Mini Hyperspeed, for example, is an eye-watering $199.99 / £189.99 / AU$329.95 while the wired Roccat Vulcan II Mini will set you back $149.99 / £129.99 / AU$259.95. Both have a mini layout; unlike the CK720, neither is hot-swappable.

The CK720 is now readily available in the US, the UK, and Australia.

  •  Value: 4.5 / 5 

Cooler Master CK720: Specs

Should you buy the Cooler Master CK720?

Cooler Master CK720 on a blue mat

(Image credit: Future / Michelle Rae Uy)

Buy it if...

You want a mini gaming keyboard for less
Top mini gaming keyboards are much more expensive. With the Cooler Master CK720, you’re getting the same level of performance for less.

You’re starting to get into keyboard modding
If you want to step into the enthusiast keyboard world but need to do so with a trusted brand, this hot-swappable keyboard from Cooler Master is a great start.

Don't buy it if...

Cooler Master CK720: Also consider

Corsair K70 Pro Mini Wireless
Offering a ridiculous amount of customizability options, this 60% keyboard delivers phenomenal performance in a compact package. This keyboard is a dream for someone wanting a truly personalized experience.

Read our full Corsair K70 Pro Mini Wireless review

Razer BlackWidow V3 Mini Hyperspeed
The sweet spot for gaming and working, this keyboard oozes style, quality and performance. It is beautifully made, striking to look at and has the performance a serious gamer will crave.

Read our full Razer BlackWidow V3 Mini review

How I tested the Cooler Master CK720

  • Spent a few weeks testing it
  • Used it mostly for gaming and work
  • Tested its features and performance as well as did some modding

I tested the Cooler Master CK720 for a few weeks, using it as my gaming keyboard and my main keyboard for work. I tested it with games like Cyberpunk 2077, Kena: Bridge of Spirits, and Hogwarts Legacy. I also used it to compose emails and write articles.

I made sure to mod it to see how easy it is to customize, removing the keycaps and switches as well as top plate and replacing the former two with keycaps and switches from my collection.

As a keyboard enthusiast, I own a small collection of mechanical keyboards, many of them hot-swappable and I customize when I find the time. I’ve also been testing keyboards, from productivity ones to gaming options, for years now, even before I joined the TechRadar Editorial team.

Read more about how we test

First reviewed April 2023

Zscaler Private Access review
9:00 pm |

Author: admin | Category: Computers Gadgets | Comments: Off

ZScaler Private Access (ZPA) is an innovative, cloud-based zero-trust solution that offers a smooth, secure connection between distant devices and confidential applications on the public cloud or within a data center. By keeping these applications shielded from the internet, they remain out of reach for unauthorized users. ZPA is compatible with both managed and unmanaged devices, granting protection to any private application, not just web apps. Built with a zero-trust network access (ZTNA) basis, users are connected to outbound authorization, instead of extending the network as with older VPNs. This way, IP addresses are always hidden and DDoS is not an option.

As a welcome bonus, ZPA wants to get its job done better than any virtual private network (VPN) while cutting down on fat when it comes to maintenance demands, costs, and security risks. If you are into protecting access to private assets and applications across the cloud, data centers, or just wherever you keep your enterprise resources, Zscaler Private Access is surely worthy of your attention.

Now, let’s see why this is the case.

Zscaler Private Access security features

Zscaler Private Access markets its security model around the idea of intelligent restriction of access to internal services and applications of an organization. At the same time, it wants to position itself as a safer alternative to VPNs by eliminating the need to connect to one’s network to get access to applications.

ZPA may appear to be a promising solution for secure corporate access, but its performance leaves much to be desired for a variety of reasons. Of Zscaler's 150 Point-of-Presences (PoP), ZPA is only available from 50 locations, leading to greater latency as user data must be sent back to a PoP before reaching the corporate data center. Additionally, these PoPs are nothing more than virtual machines hosted on Amazon Web Services, rendering them incapable of controlling routing or scaling resources to meet demand. 

Moreover, Zscaler data centers rely on the internet to connect with each other instead of utilizing a private backbone. This means that WAN traffic is exposed to the variability and poor performance of the public internet, even for data used to manage the service. Though private backbone and WAN optimization could greatly improve performance, these technologies are not available with Zscaler.

Performance issues aside, ZPA offers great security features that can rival the best solutions on the market. Rather than going with an alternative, you can implement a collection of context-driven access rules controlling entry to internal resources based on the necessities of a particular task at hand. This implies that obtaining these assets occurs without network access, which, as expected, reduces the risks associated with this attack vector.

This distinction sets ZPA apart from the Zscaler Internet Access (ZIA) solution offered by the same company, which focuses on delivering web access to public applications. With ZPA, your organization benefits from single sign-on (SSO) authentication for all utilized applications and customizable access policies that can be tailored and expanded according to your requirements.

Perimeter 81 is a Forrester New Wave™ ZTNA Leader 

Ditch your legacy VPN hardware and automate your network security with ZTNA.  Secure remote access from anywhere with just a few clicks. Onboard your entire organization in minutes, not days. Learn why Perimeter 81 is one of TechRadar's choices for the best ZTNA security providers. Download the report.

Management features

One of ZPA's shining highlights is its centralized policy management, offering administrators the opportunity to establish highly specific access policies for different users and teams across the organisation. Policies can be crafted according to user roles, locations, devices, and more, guaranteeing only authorised personnel can gain access to particular applications. This centralized strategy simplifies the handling of access policies and furnishes enhanced transparency into who has entry to which resources.

ZPA effortlessly meshes with popular identity and access management (IAM) solutions, like Active Directory, SAML and OAuth, enabling organizations to use their existing user authentication processes to ensure a smooth and secure user experience. In tandem with IAM best practices, ZPA makes sure that access to critical data is thoroughly regulated and monitored.

ZPA is built on the principles of Zero Trust, which means that it assumes that no user, device, or application can be trusted by default. ZPA provides continuous authentication and authorization, only granting access to the specific applications a user is authorized to use. This approach helps prevent unauthorized access and reduces the risk of lateral movement within the network by malicious actors.

With ZPA's application segmentation, each application is kept separate from other applications and network resources, significantly decreasing the attack surface and keeping compromises in one application from putting the others or network resources in jeopardy. This application segmentation is essential in safeguarding sensitive data and maintaining a secure security posture within the organization.

Zscaler Private Access interface

The living and the beating heart of the Zscaler Private Access is the ZPA Admin Portal which is chock-full of dashboards that you would expect to see when promised a bird’s eye view of your resources, users, and infrastructure.

The ZPA interface is designed to provide a streamlined and intuitive way of managing your organization's private access configuration. Divided into several sections, you can easily manage different aspects of the solution. 

The Dashboard provides an overview of the ZPA environment with real-time stats and graphs to quickly identify potential issues. Connectors establish secure connections between ZPA and your private apps. The Applications section lets you configure and manage accessible apps and define access rules. With the Policies section, you can create granular access policies based on user identity, device posture, location, and more. 

The Identities section lets you manage user and group identities, and the Settings section allows you to configure global settings. Finally, ZPA provides powerful reporting and analytics to understand usage patterns, identify security risks, and optimize your private access deployment.

The interface also features a range of diagnostic features, including those that notify you of user activity, user status, app connector status, ZPA private service edge status, etc. 

To make things easier, you can have your ZPA automatically identify and notify you of the applications the access to which is being requested by users, or do everything manually. The same interface is used to set up specific policies that regulate access to apps, with an option to make all other applications virtually invisible and unroutable to unauthorized users. 

You can install Zscaler Client Connector to any of your devices, including mobile platforms, in order to manage access to applications from any location. The Connector is easily accessed by providing SAML 2.0-based SSO credentials.

Pricing

Gaining access to Zscaler Private Access requires you to remain tight-lipped on pricing - so, though they prioritize convenience and accessibility, learning more about their plans and prices takes a bit of time talking to their "cloud security specialist". However, we hope that you have the tolerance to endure the secrecy. 

The cost of Zscaler Private Access is determined by various elements such as setup size, optional extras, and supplementary modules. We advise that you get in touch with Zscaler directly to obtain personalized rates based on your organization's needs. Subscriptions are generally invoiced on a yearly basis, and it is possible to configure the solution swiftly, making it an opportune and useful choice for companies striving to protect their private app access.

ZPA offers a selection of editions tailored for each company and their unique situation. This selection of Professional, Business and Transformation Editions provides an extensive array of services. The Professional edition is a great entry-level solution with its array of core functions, while the Business Edition caters to a corporate user-base with its range of on-premise and remote workforce friendly features. Last but certainly not least, the Transformation Edition gives customers the ability to maximize application workloads and business-to-business customers.

Conclusion

In a nutshell, Zscaler Private Access emerges as a solid contender for firms looking to bolster their network security via a zero-trust approach. Boasting seamless integration and an intuitive interface, this solution caters to businesses of all sizes.

However, costs can fluctuate depending on several factors. Therefore, it's crucial to evaluate your company's specific needs and ponder the potential benefits of harnessing this security tool. We urge you to contact Zscaler for a tailored quote and conduct additional research to make an informed choice.

Ultimately, embracing Zscaler Private Access hinges on a comprehensive analysis of your organization's needs, financial capacity, and long-term goals. So, assess wisely, and choose accordingly.

Xiaomi Band 8, Sound Move speaker, 86-inch Mini LED smart TV unveiled
8:01 pm |

Author: admin | Category: Mobile phones news | Tags: | Comments: Off

Continuing the coverage of new Xiaomi products that were announced today brings us to the Xiaomi Band 8, Sound Move speaker and the new 86-inch mini-LED smart TV. Xiaomi Band 8 The eighth iteration in the Xiaomi Band series brings retains the 1.62 inches AMOLED pill-shaped screen of its predecessor with 490x192px resolution a 60Hz refresh rate. Band 8 also brings Always on Display support and a 600 nits peak brightness compared to 500 nits on Band 7. Xiaomi Band 8 Band 8 comes with plenty of official strap options from Xiaomi including all sorts of materials such as leather,...

Samsung Galaxy A24 4G pops up on Google Play Supported Devices list
6:39 pm |

Author: admin | Category: Mobile phones news | Comments: Off

Samsung's Galaxy A24 4G is finally approaching its announcement. The latest clear indication is the device's model number popping up on the Google Play Supported Devices List. It's something of a formality at this point - it's no secret the phone is coming, and we have a good idea of its specs. Those include a 6.5-inch FHD+ Super AMOLED display of 90Hz refresh rate, a triple camera setup on the back with 50MP main, 8MP ultrawide, and 2MP macro units, and a 13MP selfie camera. The chipset is a MediaTek Helio G99, paired to 4GB of RAM. Finally, we expect a 5,000mAh battery with 25W...

In Mrs. Davis, AI is almost identical to magic – and that’s the whole point
6:05 pm |

Author: admin | Category: Computers Gadgets | Tags: | Comments: Off

Arthur C. Clarke once said: "Any sufficiently advanced technology is indistinguishable from magic." What he didn't follow up with is this – What if there was an entire show based on that sentence? 

If he did, it would be Mrs. Davis. The new Peacock exclusive, which starts airing April 20, is about a lot of things. And when I saw a lot, I mean a lot. Technology and AI, manhood and masculinity, religion, zealotry, blind devotion, faith, commercialism, the joy of quirky non-sequiturs, and how even powerful algorithms can get things very, very wrong are all explored thematically here. 

After watching the first few action and in-action-filled episodes, I initially struggled to understand the point of all of it. Eventually, however, the puzzle pieces began slotting into place in fascinating fashion.

I'd like to tell you a lot more about the eight-episode series (which I watched in full), but much of what I want to say will spoil the multitude of surprises (small and very big), secrets, and Easter eggs hidden within the action-fantasy-dramedy. If you don't want me peeling away the many layers of the onion in front of you, stop reading and check out Mrs. Davis for yourself. Otherwise, here we go.

Potential Mrs. Davis spoilers follow.

See more

The title doesn't describe the show's star Betty Gilpin (Glow), who plays Simone, a horse- and motorcycle-riding nun. Instead, that's the name of what is ostensibly the show's other main character, an artificial intelligence (AI) that's often unironically referred to as "her" or, derisively by Simone as "it." It clearly prefers "Mrs. Davis," though it does go by other names around the world, including "Madonna."

Think of the titular AI as the logical conclusion of Siri and Alexa. Or, more accurately, ChatGPT, Bard, or Bing AI. Rather than a handful of people using the chatbot to answer the occasional question or help them finish that KPI report, Mrs. Davis is ubiquitous and streaming to everyone's ears through a wide variety of Bluetooth earbuds (I noticed AirPods and other brands). Her (its) role though is somewhat different than a dispassionate AI from Google or OpenAI. Instead, Mrs. Davis is deeply involved in people's happiness quotient, which is measured by gaining their wings. Not physical wings, but digital ones that you can see on someone's back when you view them via your phone's AI filter. People gain their wings by fulfilling a quest dictated by Mrs. Davis.

Simone appears to hate Mrs. Davis and, initially at least, is the rare human who refuses to sport earbuds and speak to the AI/algorithm. The AI expresses its displeasure by sending a mysterious collection of oddballs (all people hoping to earn wings) after her, and by destroying her convent's jam business, which results in all the nuns being cast to the winds. Hey, you were warned that Mrs. Davis was a weirdly positioned show, rather than your typical kind of television offering.

Wiley and Mrs Davis sit in a white room

Wiley (Jake McDorman) and Simone (Betty Gilpin) in Mrs. Davis. (Image credit: Peacock)

The series has a lot of characters who drop in and out, and the purpose and point of anything isn't abundantly clear until the third episode. What, for instance, is the obsession with magic? Why is Simone a nun who also insists she's married? As the saying goes, all will be revealed. And, as the show peels away the layers of confusion, it also becomes more compelling. There's a quest for Simone and, yes, it does involve the Holy Grail, and finding said grail could result in Mrs. Davis ending itself.

The trio of main characters is completed by Wiley (Jake McDorman), Simone's childhood friend, ex-boyfriend, and possible adversary. Okay, there may also be a fourth, key character – Jay (Andy McQueen), who runs a diner frequented by Simone and where she gets a lot of her marching orders. The cast of supporting characters is equally strong with the likes of Margo Martindale (The Americans) and Katja Herbers (Evil).

It takes some time for the cast to gel, possibly because there's so much storytelling and elements crammed into each episode. That's despite the fact that some hour-long episodes can feel a bit sluggish, too. Episode 3's way-too-long giant sword sequence carried the water for a lot of exposition and flashbacks. Every once in a while, you're left pining for a little linear storytelling.

Where are we going with this?

The dystopian view of AI is one that audiences will likely lap up, but I kept waiting for a revelation about the people behind the curtain, i.e. the individuals responsible for Mrs. Davis itself. 

While that's not exactly the point of the show, we learn how magic abhors a truth-teller. The algorithm – or, more specifically Mrs. Davis – killed magic performances. If you want to know the secret behind any trick, you just ask, which is an obvious commentary on the corrosive power of AI. Later, we hear one of the AI's most revealing statements: "My users aren't responsive to the truth. They're much more responsive when I tell them exactly what they want to hear" – which begs the question: Is there a creator at all?

There are other big reveals that I'd rather not get into because I think they ruin some of the series' best bits and deepest thoughts about technology, magic, and religion; three things that have far more in common than you might initially think.

The gimlet tech perspective, the show's puzzle-like nature, and even some of the mystical and religious elements should not come as a surprise considering the show was created and written by Tara Hernandez, (HBO Max's The Big Bang Theory) and Damon Lindelof (Lost, one of the best Disney Plus shows). And, like that latter show, Mrs. Davis can get lost in the sometimes ponderous plot. Some of the show's most head-slappingly startling moments can be traced to writer Jonny Sun. The author-illustrator is well known online for his best-selling book Everyone's a Aliebn When Ur a Aliebn Too, a graphic novel that, with its themes of an alien's search for meaning and happiness, is at least Mrs. Davis-adjacent. The good news is that Gilpin's strong, emotional presence provides a sort of magnetic core that one happily spins back to. When she's not on the screen, which is rare, the show can flag.

I found myself equally intrigued and frustrated by Mrs. Davis. It stacks absurdity upon absurdity, while always mixing in yet another level of mystery. The AI is omnipresent but because it lacks a physical presence, it can also feel somewhat absent from the series. Without the titular AI driving the plot forward, Mrs. Davis sometimes just spins around Simone or Wiley without going anywhere.

Like Poker Face, one of Peacock's best TV originals, one might argue that every minute of Mrs. Davis is meaningful and any word, image, or tableau ignored is a clue missed. Whether it can survive under the weight of its own intricacies or the constantly winking nature of its exposition remains to be seen. I enjoyed it and was only 60% certain I ever truly understood what the hell was going on – and I'm okay with that.

Mrs. Davis' first four episodes launch on Peacock on Thursday, April 20.

Xiaomi Pad 6 and Pad 6 Pro announced
5:40 pm |

Author: admin | Category: Mobile phones news | Comments: Off

The Xiaomi 13 Ultra was the centerpiece of the company’s launch event today, but the company also unveiled the Xiaomi Pad 6 and Pad 6 Pro tablets. The new slates bring updates in key areas over their predecessors including new chipsets, improved displays and a fresh new design inspired by the Xiaomi 13 series phones. Xiaomi Pad 6 Both tablets pack 11-inch IPS LCDs with 1800 x 2880 px resolution and a 144Hz refresh rate 16:10 aspect ratio. The Pro model gets a snappier 144Hz refresh rate while the vanilla retains the 120Hz from the Pad 5 series. Xiaomi Pad 6 Pro gets last...

Dead Island 2 Review – so close, yet so far
5:00 pm |

Author: admin | Category: Computers Gadgets | Comments: Off
Review information

Time played: 16 hours 

Platform: Xbox Series X

There’s a lot of potential in Dead Island 2; the creative settings and gory gameplay are truly outlandish and were often the highlight of my time in Hell-A, but unfortunately, no amount of gruesome finishing kills or giant animatronic spiders could make me relish the time I spent in this zombocalypse. 

However, if you’re out of multiplayer games to play with friends and have Xbox Game Pass, then Dead Island 2 is definetly worth checking out, as it will be on Xbox’s subscription service from day one. Sadly, there aren’t many other reasons to jump into this apocalyptic game, not when many better alternatives are available.  

Dead Island 2 price and release date

  • What is it? A sequel to Techland’s 2011 zombie survival game 
  • Release date: April 21, 2023 
  • Price: $69.99 / £59.99 / AUS$109.95 
  • What can I play it on? PC, PS5, Xbox Series X|S 

You brought a knife to a gunfight

Firing a handgun at explosive barrels

(Image credit: Deep Silver)

One of my favorite aspects of the original Dead Island was the focus and dependence on melee. As someone who’s played their fair share of zombie games, it was refreshing to have one title ignore firearms, for the most part. With this in mind, at least initially, Dead Island 2’s customization and upgrade options for its melee weapons filled me with delight.

While the customization was cool, it did nothing more than add a couple of perks and flare to your weapons. In actuality, when you’re fighting through ravenous hordes of zombies, there’s little time to sit down and reflect on which pointy stick you want to use.

The joy of using gory finish moves was overshadowed by frustrating gameplay

Like the weapons, the joy of using gory finish moves was overshadowed by frustrating gameplay. Thankfully, you won’t get hit by bystanding zombies while trying to finish off one of their friends. However, taking the time to combo can put you at a disadvantage as zombies armed with explosives, toxic spew, and a shocking voice surround you. Having to single-handedly fight off seemingly never-ending hordes of aggressive yet stupid zombies quickly lost its appeal as it began to feel like I was swatting annoying horse flies rather than fulfilling my role as the killer protagonist. 

Handling the undead crowds eventually improved after the first firearms were introduced in Dead Island 2; relying on guns isn’t very Dead Island-like. The first few instances of gun use turned this sequel into a literal corridor shooter as I ran through containment corridors and the sewers. Why would I take the time to combo and use my hard-won melee weapons when I could shoot a zombie in the head and call it a day? 

The problem of guns does ease up at points, particularly during boss battles when you’re encouraged to utilize the environment fully. However, these short reliefs don’t compensate for the overwhelming frustration that followed me around Dead Island 2 like a lost puppy. 

Better with friends

Survivor with his hand in a dead zombie's chest

(Image credit: Deep Silver)

My time playing Dead Island 2 was a bit of a chore. However, it definitely gave my neighbours something interesting to listen to as I screamed at my TV. Needless to say, I won’t be rushing back to play singleplayer in my spare time, though, with friends, it could be different. 

While Dead Island 2 is doable, if unspectacular, in singleplayer, it seems like multiplayer is definitely the way to go. Armed with all your modded weapons and a group of trustworthy and endurant friends, this survival zombie game has the potential for some high-octane game nights. Much like the Dead Island 2 preview, taking on hordes of relentless zombies while trying to shimmy a key card off of a buff, dead security guard seems like it would be easier with a coordinated group.  

Falling short

clown zombie with blades for hands

(Image credit: Deep Silver)

Gore is a staple of the zombie genre, so doing it well isn't an achievement, it's an expectation

Despite the frustrating nature of Dead Island 2, there seemed to be potential in the eye-grabbing environments and F.L.E.S.H. dismemberment system. However, gore is a staple of the zombie genre, so doing it well isn't an achievement, it's an expectation. 

This isn’t Dambuster Studios's first failure to revitalize a series. Homefront: The Revolution is another example of great prospects with poor execution. That, too, was a sequel picking up the pieces from another developer, and much like with that game, Dead Island 2 falls short at the final hurdle.

During my time playing Dead Island 2, I was met with the occasional bug that would freeze and then position my character in a slightly different location, which was incredibly disorientating when fighting tons of the undead. I also noticed that some of the directional prompts weren’t accurate. For example, when trapped in a movie studio and waiting for an elevator, I was told to defend myself until it arrived. In actuality, I needed to kill all the zombies before I could escape. While this is a small issue, it drastically changed how I played Dead Island 2; no one likes having to psychoanalyse what the devs actually want you to do.  

All of these smaller aspects took away from the more enjoyable experiences in Dead Island 2; even in parts I enjoyed, I always had a bad taste left in my mouth. But for those who are still curious and have Game Pass on PC or Xbox Series X|S, then by all means, have at it; but please don’t go alone.  

« Previous PageNext Page »