
Google Updates Iconic 'G' Logo After Nearly 10 Years
Google has updated its "G" logo after nearly 10 years, according to a report from 9to5Google on Monday.
The new logo has a gradiant effect when transitioning between colors, whereas the previous version separated Google's iconic red, blue, yellow and green into blocks. The updated logo is appearing on the Google Search iOS app store page. 9to5Google reports that the updated icon has landed on the Android with Google app 16.18. The Google logo hasn't been updated everywhere yet.
A representative for Google didn't immediately respond to a request for comment.
Read more: Best Laptops of 2025
The last time Google updated its "G" logo was back in September of 2015. As Google puts AI at the forefront of its product portfolio, it seems that a new iconography is coming along with the changes. Google Gemini, the company's generative AI assistant, uses blue-to-purple gradients in a diamond-star motif. The six-letter Gemini logo also uses a gradient. While Google's iconography has often stuck to bold reds, yellows, greens and blues, the change could be an attempt to better sync design between Google and its AI products.

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


Associated Press
18 minutes ago
- Associated Press
SkyCrest Capital Announces Completion of SAX-iCore Upgrade for AI Trading System SkyAlpha X, Secures $150 Million in Institutional Orders
Denver, UT, June 08, 2025 (GLOBE NEWSWIRE) -- SkyCrest Capital officially announced today that its core AI trading system, SkyAlpha X, has successfully completed a comprehensive upgrade to its third-generation architecture, launching the institutional-grade version SAX-iCore (SkyAlpha X Institutional Core). This upgrade marks SkyAlpha X's entry into a new era that balances high-frequency trading, cross-market arbitrage, and structured asset management, quickly drawing significant attention from international markets. According to SkyCrest Capital's technical and business teams, SAX-iCore has so far secured procurement intentions and signed orders from global hedge funds, quantitative institutions, and crypto-financial platforms, totaling $150 million. These include: • A cross-asset hedge fund based in New York managing over $4.5 billion in assets, which has formally signed an integration agreement to deploy SAX-iCore for strategy automation in the U.S. equities and ETF options markets. • A digital asset market maker in Singapore, which has embedded SAX-iCore as the core execution module in its DEX liquidity engine, mainly for perpetual contract arbitrage and volatility trading. • An asset management firm in London that has signed a cooperation agreement for the AI-driven options volatility detection module, planning to integrate SAX-iCore into its global macro hedge strategies. Key highlights of the upgrade include: • Structured Volatility Engine (SVE): Detects breakout windows hidden within intraday price behavior, adaptable to index futures, tech stocks, and cryptocurrencies. • Cross-Market Signal Coordination System: Enables strategic integration across U.S. equities, crypto, and options markets for trend capture, volatility arbitrage, and macro alerts. • Smart Capital Flow Radar (SCF-Radar): Tracks institutional build-up and withdrawal paths to construct real-time capital behavior maps, enhancing trend confirmation efficiency. • Options Anomaly Volatility Alert Module: Combines implied volatility shifts with Gamma risk identification to significantly improve strategic responsiveness and defense ahead of market events. Dr. Ross, Founder and Chief Science Officer of SkyCrest Capital, stated: 'SAX-iCore is not a mere upgrade of a traditional trading system, but a deep response to the increasingly interconnected multi-market environment. We've made breakthroughs not only at the algorithmic level but also ensured the system evolves in sync with real-world trading structures-this enables us to provide institutional investors with faster, more penetrative strategic decision engines amid globally intensifying asset volatility.' Since its initial launch in 2021, SkyAlpha X has delivered structured trading insights for stocks, futures, options, and crypto assets to SkyCrest's strategy teams and institutional partners. As the flagship module of the platform's 3.0 phase, SAX-iCore will serve as the core infrastructure for high-frequency trading, global asset allocation, and AI-driven execution system integration. SkyCrest Capital is currently offering early access to SAX-iCore for select strategic partners and is opening a whitelist application process for high-net-worth clients to access strategic modules. Retail-focused modules and tiered signal services for high-frequency trading are planned for phased rollout. For further information, please contact: Media Contact SkyCrest Capital PR Department Website: Contact: Audrey Sinclair Email: [email protected] Audrey Sinclair SkyCrest Capital service at


Forbes
25 minutes ago
- Forbes
Outsmarting AI: 4 Ways To Future-Proof Your Threatened Career
According to Gallup, 22% of U.S. workers are worried they will lose their jobs to generative AI—a seven percent increase since 2021. Companies are moving faster than expected to replace workers with AI. Recently, Microsoft cut three percent of its staff, and Duolingo said it would reduce contractors as AI takes over their tasks. The digital consultancy firm Customertimes reports that Google searches for 'Will AI take my job' have risen by +108% after the latest layoffs. And 18.4 million TikTok videos criticize Duolingo's 'AI-first' strategy, calling for a strike. It's time to consider steps to take for outsmarting AI in the age of the machine. Atalia Horenshtien, head of AI practice at Customertimes, is leading the introduction of AI-workers in many global companies. She told me by email that if you've been laid off in an AI restructure, don't blame yourself for a company's failure to evolve responsibly. Instead, she advises that you take inventory by asking 'What broke without you? What decisions relied on your judgment?' She points out that that's your edge: context, nuance and expertise AI still can't replicate. 'In this new era, proving your value means showcasing the human skills machines can't mimic,' Horenshtien explains. "And while companies chase automation, they'd do well to remember: AI doesn't build culture, loyalty or trust. People do.' If you're concerned about losing your job in the age of AI, here are four tips Horenshtien, shared with me on how you can future-proof your career and compete against the algorithms. She reminds you that AI isn't here to compete with your work ethic. 'It's here to automate what can be automated and amplify what you do best,' she says. 'Tools like generative AI aren't just time-savers, they unlock skills many never had before. Writers write faster, non-writers become content creators and everyday professionals suddenly have design, research or strategy capabilities at their fingertips. The most valuable professionals won't be the ones who resist AI--they'll be the ones who know how to partner with it to level up.' AI will likely replace tasks, not whole jobs, especially those rooted in repetition, according to Horenshtien. 'What it still can't replicate well: original thinking, emotional intelligence, ethical judgment and complex decision-making. If your role leans heavily on these, double down. If not, it's time to pivot.' She states that prompt engineering, model selection and workflow design are fast becoming core skills. 'You don't need to become a data scientist, but you do need to know how to make AI tools useful. The ability to bridge the gap between tech and business outcomes is what will set people apart.' Horenshtien suggests that the worst move is to stay still. "If your role includes repetitive tasks, assume they're next in line for automation. Upskilling now, whether in AI tools, business strategy or adjacent fields, puts you ahead of the curve and out of the risk zone when change hits. Before leaders can help employees with the fears of AI taking their jobs, they must first understand the quandary themselves and have clear and factual explanations to the question on everyone's mind, 'Is AI a tool or a threat?' Horenshtien asserts that business leaders have a responsibility to take action for their employees, telling me that they can take at least five steps. Horenshtien explains that if you're like most people, you know change is coming. She believes the worst thing you can do as a leader is to go silent. 'Uncertainty breeds fear, and fear drives talent out the door. 'Be clear about what AI means for your business, how it will affect roles and what support you'll offer. When people understand the plan, they're far more likely to stay, adapt and contribute to the shift." She admits that letting people go may seem efficient, but cautions you that it's short-sighted. She recommends, instead, that your better move is to invest in internal mobility. 'Map out which roles are at risk and which are growing,"she suggests. "Offer real pathways to reskill toward AI-enhanced positions, and make that part of a clear workforce transition strategy, not an afterthought'. 'AI is part of your future, it needs to be part of your onboarding,'she advises. 'Don't just roll out tools—equip people to understand and use them effectively. Introduce AI basics, tool-specific training, and real examples during onboarding so employees build confidence early. When teams know how and why AI fits into their day-to-day, adoption becomes a mindset, not a mandate." She points out that AI frees up time and recommends that you use it wisely. 'Encourage employees to test new tools, automate the boring stuff and rethink their workflows. When people are given the mandate to innovate, many will discover value the business didn't know it needed.' 'AI adoption is a change management challenge as much as a technical one,' she explains, adding the importance of preparing teams for shifts in roles, responsibilities and expectations. 'Give managers the training and support they need to lead through change, not just push new tools.' I spoke with Alari Aho, career expert and CEO of Toggl Hire, who suggests the first step to bounce back from an AI threat is to remember that layoffs are the beginning, not the end. If you're faced with a sudden job layoff, Aho suggests it could be a gift in disguise, calling layoffs a rebranding moment. 'It's a chance to take control of your story, redefine your professional identity and show the market what you're truly made of.' He suggests that you start by owning the narrative—frame the layoff as a business decision, not a personal failure. Then sharpen your value through a thoughtful rebrand, reconnect with your network with purpose and use any downtime to upskill in ways that align with where you want to go next. If you're a full-time employee and are replaced by AI, business leaders declare that one of the best ways of outsmarting AI in 2025 is to build gig jobs as a safety net, not only as extra income to make ends meet but as career insurance in case your job disappears or you're faced with layoffs. Studies show that many laid-off workers end up in side hustles with more autonomy, making higher salaries than in their previous positions that rival full-time wages.
Yahoo
44 minutes ago
- Yahoo
Chinese hackers and user lapses turn smartphones into a 'mobile security crisis'
WASHINGTON (AP) — Cybersecurity investigators noticed a highly unusual software crash — it was affecting a small number of smartphones belonging to people who worked in government, politics, tech and journalism. The crashes, which began late last year and carried into 2025, were the tipoff to a sophisticated cyberattack that may have allowed hackers to infiltrate a phone without a single click from the user. The attackers left no clues about their identities, but investigators at the cybersecurity firm iVerify noticed that the victims all had something in common: They worked in fields of interest to China's government and had been targeted by Chinese hackers in the past. Foreign hackers have increasingly identified smartphones, other mobile devices and the apps they use as a weak link in U.S. cyberdefenses. Groups linked to China's military and intelligence service have targeted the smartphones of prominent Americans and burrowed deep into telecommunication networks, according to national security and tech experts. It shows how vulnerable mobile devices and apps are and the risk that security failures could expose sensitive information or leave American interests open to cyberattack, those experts say. 'The world is in a mobile security crisis right now,' said Rocky Cole, a former cybersecurity expert at the National Security Agency and Google and now chief operations officer at iVerify. 'No one is watching the phones.' US zeroes in on China as a threat, and Beijing levels its own accusations U.S. authorities warned in December of a sprawling Chinese hacking campaign designed to gain access to the texts and phone conversations of an unknown number of Americans. 'They were able to listen in on phone calls in real time and able to read text messages,' said Rep. Raja Krishnamoorthi of Illinois. He is a member of the House Intelligence Committee and the senior Democrat on the Committee on the Chinese Communist Party, created to study the geopolitical threat from China. Chinese hackers also sought access to phones used by Donald Trump and running mate JD Vance during the 2024 campaign. The Chinese government has denied allegations of cyberespionage, and accused the U.S. of mounting its own cyberoperations. It says America cites national security as an excuse to issue sanctions against Chinese organizations and keep Chinese technology companies from the global market. 'The U.S. has long been using all kinds of despicable methods to steal other countries' secrets,' Lin Jian, a spokesman for China's foreign ministry, said at a recent press conference in response to questions about a CIA push to recruit Chinese informants. U.S. intelligence officials have said China poses a significant, persistent threat to U.S. economic and political interests, and it has harnessed the tools of digital conflict: online propaganda and disinformation, artificial intelligence and cyber surveillance and espionage designed to deliver a significant advantage in any military conflict. Mobile networks are a top concern. The U.S. and many of its closest allies have banned Chinese telecom companies from their networks. Other countries, including Germany, are phasing out Chinese involvement because of security concerns. But Chinese tech firms remain a big part of the systems in many nations, giving state-controlled companies a global footprint they could exploit for cyberattacks, experts say. Chinese telecom firms still maintain some routing and cloud storage systems in the U.S. — a growing concern to lawmakers. 'The American people deserve to know if Beijing is quietly using state-owned firms to infiltrate our critical infrastructure,' U.S. Rep. John Moolenaar, R-Mich. and chairman of the China committee, which in April issued subpoenas to Chinese telecom companies seeking information about their U.S. operations. Mobile devices have become an intel treasure trove Mobile devices can buy stocks, launch drones and run power plants. Their proliferation has often outpaced their security. The phones of top government officials are especially valuable, containing sensitive government information, passwords and an insider's glimpse into policy discussions and decision-making. The White House said last week that someone impersonating Susie Wiles, Trump's chief of staff, reached out to governors, senators and business leaders with texts and phone calls. It's unclear how the person obtained Wiles' connections, but they apparently gained access to the contacts in her personal cellphone, The Wall Street Journal reported. The messages and calls were not coming from Wiles' number, the newspaper reported. While most smartphones and tablets come with robust security, apps and connected devices often lack these protections or the regular software updates needed to stay ahead of new threats. That makes every fitness tracker, baby monitor or smart appliance another potential foothold for hackers looking to penetrate networks, retrieve information or infect systems with malware. Federal officials launched a program this year creating a 'cyber trust mark' for connected devices that meet federal security standards. But consumers and officials shouldn't lower their guard, said Snehal Antani, former chief technology officer for the Pentagon's Joint Special Operations Command. 'They're finding backdoors in Barbie dolls,' said Antani, now CEO of a cybersecurity firm, referring to concerns from researchers who successfully hacked the microphone of a digitally connected version of the toy. Risks emerge when smartphone users don't take precautions It doesn't matter how secure a mobile device is if the user doesn't follow basic security precautions, especially if their device contains classified or sensitive information, experts say. Mike Waltz, who departed as Trump's national security adviser, inadvertently added The Atlantic's editor-in-chief to a Signal chat used to discuss military plans with other top officials. Secretary of Defense Pete Hegseth had an internet connection that bypassed the Pentagon's security protocols set up in his office so he could use the Signal messaging app on a personal computer, the AP has reported. Hegseth has rejected assertions that he shared classified information on Signal, a popular encrypted messaging app not approved for the use of communicating classified information. China and other nations will try to take advantage of such lapses, and national security officials must take steps to prevent them from recurring, said Michael Williams, a national security expert at Syracuse University. 'They all have access to a variety of secure communications platforms,' Williams said. "We just can't share things willy-nilly.' David Klepper, The Associated Press Error while retrieving data Sign in to access your portfolio Error while retrieving data Error while retrieving data Error while retrieving data Error while retrieving data