
Range Rover Velar EV Spied With Weird Aero and Cladding
The Range Rover Velar embraces the idea of a Land Rover you keep clean, with a relatively low ride height and sleek lines (though it can still play in the dirt). A fully electric variant is in the pipeline, and our spy guy in Germany recently caught its prototype whipping around the Nürburgring.
While the current Velar kind of looks like a regular Range Rover, just squished and swept back a bit, this prototype seems to be a little more visually front-heavy. The hood looks a bit shorter, and the area behind the second-row windows has some angular haunches to it.
On the back, there are very pronounced spoilers above the rear window, split in the middle, plus a smaller spoiler below the window, kind of like a Cayenne Coupe. Heavily pronounced chunks along the sides of the roof, and big protrusions where the cargo area windows would normally be, caught my attention too.
My first thought was that these are just disguise prosthetics to distract us from the car's true silhouette. But then again, this is the brand that bolted some lunch boxes to the side of the Defender and pushed it to production. The Defender's OEM exterior cargo boxes look silly, but have their uses. Land Rover
It could be that the Velar will have some exaggerated, integrated roof rack rails and some kind of funky design feature in the back, similar to the Defender's optional box. Or maybe it's just some interesting aero going on in the back to squeeze more electric driving range.
We also get to see what the hatch opening looks like—a big clamshell that should provide a lot of access to the back.
Rumor had it that the Range Rover Velar EV would be a 2026 model, but the 2025 calendar year doesn't have too many months left in it. So … we'll see. Meanwhile, take a look at some more angles of the spied Velar prototype and let us know what you think we're looking at.
Got a tip? Send us a note at tips@thedrive.com
Hashtags

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


Fox News
19 minutes ago
- Fox News
Russia strikes US electronics plant in latest attack on Ukraine
Fox News reporter Stephanie Bennett reports on a new airstrike by Russia that impacted a U.S. electronics plant near the Hungary border on 'Special Report.'


CNET
an hour ago
- CNET
You May Not Want to Use Your Password Manager's Auto-Fill. Here's Why and What to Do Instead
A reliable password manager is one of our essential recommendations as part of your cybersecurity toolkit, alongside a VPN and antivirus software. However, a Czech Republic-based security researcher, Marek Tóth, recently revealed at Defcon 33 that a clickjacking attack could be used to steal data from several password managers. Data that could be captured from your password manager through a specific clickjacking attack includes credit card information, personal data, usernames and passwords, passkeys or time-based one-time passwords. Here's what you need to know, including how the vulnerability works, which password managers are currently susceptible and what you can do to stay safe. A web-based clickjacking attack could be used to capture sensitive data from password managers Clickjacking is an attack that relies on a user carrying out an action -- like clicking on a button -- with the belief that the user is performing one thing when they're really doing something else. For example, you might see a button on a website encouraging you to download a plugin or firmware update, but instead of downloading whatever's being promised, it actually sends you a web page or app run by an attacker. Clickjacking can be used to capture your data, like usernames, passwords and banking information. According to Tóth's research, some password managers are susceptible to an exploit that could mean that if you unwittingly click on a web-based element that's part of an attacker's clickjacking scheme, your usernames, passwords and even banking information could be shared. For instance, you might click on what you think is an innocent CAPTCHA, and while you're solving the clickjacking CAPTCHA, your password manager autofill launches, selects all of your saved items and sends that data to an attacker. But as Tóth demonstrated, you won't see your password manager auto-fill launching, because the attacker's site has set the opacity such that your password manager's windows are invisible to you. This isn't really a password manager-specific vulnerability, but a web-based attack While Tóth demonstrated how a Document Object Model, or DOM, based attack could be used to execute malicious code in your browser, it's technically a web-based attack that websites and browsers are susceptible to, not a vulnerability exclusive to password managers. Tóth provides potential solutions for mitigating the vulnerability, and states that 'the safest solution is to display a new pop-up window' when auto-fill happens, although he concedes '...that will be very inconvenient for users.' There's currently some online debate -- 1Password told the Socket Security Team that it feels that some of Tóth's proposed solutions could be circumvented easily, and that a pop-up informing users before auto-filling would be the only way to truly warn against a clickjacking attack. At the time of writing, NordPass, ProtonPass, RoboForm, Keeper and Dashlane have implemented fixes. LastPass has implemented certain mitigations, including a pop-up notification that shows up before auto-filling personal details and credit card information. Bitwarden, Enpass and iCloud Passwords reportedly have in-progress fixes coming, while 1Password and LogMeOnce don't yet. Here's what you can do to stay safe The good news is that several password managers have already taken action, with patches rolled out from NordPass, ProtonPass, Keeper and RoboForm. But you'll want to make sure you're using the latest version of each app to ensure you've got the patch fix installed. Because clickjacking isn't a unique attack to password managers, you'll want to exercise good judgment and caution. Be careful with pop-ups, banner ads and CAPTCHAs, especially if they seem suspicious. You can try hovering your cursor over on-page elements without clicking, and the bottom of your web browser window should show you the link awaiting you, so you can see if it seems legitimate. Since the clickjacking attack relies on auto-fill, you could disable your password manager's auto-fill settings, instead relying on copying and pasting your various account credentials. That way, if you fall prey to a clickjacking attack that tries to auto-fill information from your password manager, it may not be successful. If you're concerned that your passwords have been compromised, you can make new ones. Most password managers include password generators, but if you'd prefer to create your own, I recommend abiding by the US Cybersecurity and Infrastructure Security Agency's recommendations to make your passwords at least 16 characters long, including a mix of letters, numbers and special characters. In addition to a password manager, you should be using a VPN when you're worried about privacy -- like hiding your web browsing and app activity from your ISP -- as well as antivirus software. Many VPNs and antivirus apps include ad, tracker and pop-up blockers, which may help protect against malicious sites or links. You can often bundle cybersecurity software for a convenient package, although there are pros and cons to bundling. While we typically advise against many free services, we do vouch for select free VPNs and antivirus software. Although I don't think you need to panic and jump ship, if you're truly concerned, you can always switch to a password manager that's rolled out a patch. For more, learn why you should be using a password manager and how to set one up.

Engadget
2 hours ago
- Engadget
Nonprofit search engine Ecosia offers $0 for control of Chrome
Germany-based search engine and browser nonprofit Ecosia is the latest party to make an offer for Google's Chrome. Questions about Chrome's fate have been swirling since the news that the Department of Justice would push for Google to sell the browser after the ruling that the company's search engine business constituted a monopoly. Although Google is planning to appeal the decision, that hasn't stopped other big tech businesses from pitching themselves as potential owners of Chrome. Ecosia's proposal is different. Rather than selling off the valuable browser for an upfront windfall, this plan would see Google transforming Chrome into a foundation. Ecosia would assume operational responsibility for the browser for ten years, but Google would retain the ownership and intellectual property rights. Under the arrangement, Ecosia would devote about 60 percent of Chrome's profits toward climate and environmental projects. It wouldn't pay a cent upfront for the stewardship role, but the remaining 40 percent of Chrome's profits would be given back to Google. Considering Ecosia is projecting Chrome to generate $1 trillion over the next decade, that's no small potatoes. On the surface, this idea is pretty far-out. However, going the stewardship route would deepen an existing relationship between Google and Ecosia. Google already powers the environmentally-focused benefit corporation's search engine, and the two parties have an established revenue-sharing agreement. Putting Chrome in the hands of a nonprofit rather than a for-profit rival may actually be a positive for Google, both financially and in public opinion.