{"id":59355,"date":"2025-09-16T00:27:00","date_gmt":"2025-09-16T00:27:00","guid":{"rendered":"http:\/\/a9c963f8-e970-43f7-9a75-b0b183f81556"},"modified":"2025-09-16T00:27:00","modified_gmt":"2025-09-16T00:27:00","slug":"my-search-for-the-most-durable-usb-c-cable-is-over-this-one-passes-my-brick-test","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/my-search-for-the-most-durable-usb-c-cable-is-over-this-one-passes-my-brick-test\/","title":{"rendered":"My search for the most durable USB-C cable is over &#8211; this one passes my brick test"},"content":{"rendered":"<div class=\"c-shortcodeReviewCard\">\n<div class=\"c-reviewCard g-outer-spacing-bottom-large\">\n<div class=\"u-flexbox u-flexbox-column\"><a href=\"https:\/\/www.amazon.com\/UGREEN-Retractable-Charger-MacBook-AirPods\/dp\/B0DXDT9SKW?tag=zdnet-buy-button-20\" rel=\"noopener nofollow sponsored\" target=\"_blank\" data-aps-asin=\"B0DXDT9SKW\" data-aps-asc-tag=\"zd-buy-button-20\" data-aps-asc-subtag=\"__COM_CLICK_ID__|null|dtp\" class=\"c-reviewCard_topButton\"><\/p>\n<div class=\"c-reviewCard_head g-outer-spacing-bottom-small\">\n<figure class=\"c-globalImage\">\n<div><picture class=\"c-cmsImage c-cmsImage_loaded\"> <img decoding=\"async\" src=\"https:\/\/www.zdnet.com\/a\/img\/2025\/09\/09\/22affa08-795b-4ffc-91ba-720f6c2588d7\/img-5136.jpg\" alt=\"img-5136.jpg\" width=\"456\" height=\"306\" fetchpriority=\"high\"><\/picture><\/div>\n<p> <!----><\/figure>\n<div class=\"c-reviewCard_content g-outer-spacing-top-medium u-flexbox u-flexbox-justifyBetween\">\n<h2 class=\"g-text-xxlarge g-text-xxlarge-bold g-outer-spacing-bottom-medium\">Ugreen Nexode 100W retractable USB-C cable<\/h2>\n<\/p><\/div>\n<\/div>\n<p><\/a> <!----> <\/p>\n<div class=\"c-reviewCard_lists g-text-xsmall\">\n<h3 class=\"g-text-large g-text-large-bold g-outer-spacing-bottom-xsmall\">ZDNET&#8217;s key takeaways<\/h3>\n<div class=\"c-keyTakeaways g-text-small\">\n<div class=\"c-keyTakeaways_list\">\n<ul class=\"c-keyTakeaways_listElement\">\n<li><span> Compact, palm-size design that extends out to 1 meter\/3.3 feet<\/span><\/li>\n<li><span> The cable is E-marker chipped to handle up to 100W<\/span><\/li>\n<li><span> The retractor reel is strong and can withstand 28kg\/56lb.<\/span><\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>\n<p> <!----><\/div>\n<\/div>\n<\/div>\n<p><!----><\/p>\n<p><em>Follow ZDNET:&nbsp;<\/em><span class=\"c-commerceLink\"><a href=\"https:\/\/cc.zdnet.com\/v1\/otc\/00hQi47eqnEWQ6T9d4QLBUc?element=BODY&amp;element_label=Add+us+as+a+preferred+Google+source&amp;module=LINK&amp;object_type=text-link&amp;object_uuid=5e5d2e64-4b30-43e6-8555-26eac7e449f3&amp;position=1&amp;template=article&amp;track_code=__COM_CLICK_ID__&amp;url=https%3A%2F%2Fwww.google.com%2Fpreferences%2Fsource%3Fq%3Dzdnet.com&amp;view_instance_uuid=379e95d2-6b56-476b-a90b-043a8dd63bd3\" rel=\"noopener nofollow sponsored\" target=\"_blank\"><span>Add us as a preferred source<\/span><!----><\/a><\/span><em>&nbsp;on Google.<\/em><\/p>\n<hr>\n<p>Cables are a source of never-ending frustration. Despite taking the time to carefully and methodically wrap them after each and every use using the <span class=\"c-commerceLink\"><a href=\"https:\/\/www.youtube.com\/watch?v=NYb2n6_UPEQ\" rel=\"noopener nofollow sponsored\" target=\"_blank\"><span>over-under method<\/span><!----><\/a><\/span>, they always come out of my laptop bag looking like a deranged bird&#8217;s nest. This leads to unwanted frustration, wasted time, and far too much tearing of hair.<\/p>\n<p>I&#8217;ve tried keeping the cables in little stuff sacks, but I&#8217;m just not tidy enough for that. I&#8217;ve also tried using small keychain cables. They work, sort of, but I always run into situations that require a longer cable. What I need is a longish table that resists tangling.&nbsp;<\/p>\n<p><strong>Also: <a href=\"https:\/\/www.zdnet.com\/home-and-office\/if-you-use-batteries-this-universal-tester-can-save-you-hundreds-of-dollars\/\">If you use batteries, this universal tester can save you hundreds of dollars<\/a><\/strong><\/p>\n<p>Ugreen has the answer with <span class=\"c-commerceLink\"><a href=\"https:\/\/www.amazon.com\/UGREEN-Retractable-Charger-MacBook-AirPods\/dp\/B0DXDT9SKW?tag=zdnet-buy-button-20\" rel=\"noopener nofollow sponsored\" target=\"_blank\" data-aps-asin=\"B0DXDT9SKW\" data-aps-asc-tag=\"zd-buy-button-20\" data-aps-asc-subtag=\"__COM_CLICK_ID__|null|dtp\"><span>this retractable USB-C cable<\/span><!----><\/a><\/span>. Part of the company&#8217;s Nexode brand, it&#8217;s the latest product to adopt a retractable cable.<\/p>\n<p>This cable has everything I need.&nbsp;<\/p>\n<p>First, it&#8217;s good for 100W of power transfer, which isn&#8217;t the full 140W that things like my MacBook Pro can handle, but it&#8217;s more than good enough for my on-the-go needs. It has a built-in E-marker chip, so it&#8217;s detected by any device that can use high-speed charging, allowing the correct, safest power to be negotiated for every device.<\/p>\n<p>The flat, ribbon-style cable resists tangles and abrasion, extends out to 3.3 feet\/1 meter, can lock out at four convenient preset lengths, and retracts neatly into a package that sits comfortably in the palm of your hand or your pocket &#8212; and we all know how tangled cables can get in a pocket.<\/p>\n<p><strong>Also:&nbsp;<a href=\"https:\/\/www.zdnet.com\/home-and-office\/this-handy-usb-meter-tells-you-whats-actually-going-on-with-your-ports-and-its-only-20\/\">This handy USB meter tells you what&#8217;s actually going on with your ports &#8211; and it&#8217;s only $20<\/a><\/strong><\/p>\n<p>Most people&#8217;s first concern about retractable reels is that they&#8217;ll stop retracting. I&#8217;ve been using my test cable for a few weeks now, and the retractor used in this reel is smooth and precise, and after many hundreds of uses, it is still as good as new.<\/p>\n<figure class=\"c-shortcodeImage u-clearfix c-shortcodeImage-large c-shortcodeImage-hasCaption\">\n<div class=\"c-shortcodeImage_imageContainer\">\n<div class=\"c-shortcodeImage_image\"><picture class=\"c-cmsImage\"><!----> <img decoding=\"async\" src=\"https:\/\/www.zdnet.com\/article\/my-search-for-the-most-durable-usb-c-cable-is-over-this-one-passes-my-brick-test\/\" alt=\"This is a 56 pound\/28 kg weight being dangled by the cable. \" width=\"1280\" height=\"2275.2000000000003\" fetchpriority=\"low\"><\/picture><\/div>\n<\/p><\/div><figcaption>\n<div class=\"c-shortcodeImage_caption g-inner-spacing-right-small g-color-black\" readability=\"6\">\n<div class=\"c-ShortcodeContent\" readability=\"32\">\n<p>This is a 56 pound\/28 kg weight being dangled by the cable.&nbsp;<\/p>\n<\/div>\n<\/div>\n<p> <span class=\"c-shortcodeImage_credit g-outer-spacing-top-xsmall u-block\">Adrian Kingsley-Hughes\/ZDNET <\/span><\/figcaption><\/figure>\n<p>Ugreen claims that the reel and cable can handle up to 28kg\/56lb of force, and that certainly seems to be the case &#8212; I dangled a 56-pound steel weight from mine, being careful to keep my feet out of the way in case the worst happened. Fortunately, the worst didn&#8217;t happen, and nothing gave way.<\/p>\n<h2>ZDNET&#8217;s buying advice<\/h2>\n<p>I&#8217;m impressed by Nexode&#8217;s recent product releases &#8212; there&#8217;s real innovation backed by excellent design and engineering. Every product I&#8217;ve tested has been a hit, and this 100W retractable cable is no exception.<\/p>\n<p>The setup works great for me. It&#8217;s quick to deploy and even quicker to pack away, and it works reliably every time. I can attest to it being one strong bit of kit.<\/p>\n<p>For $14, this <span class=\"c-commerceLink\"><a href=\"https:\/\/www.amazon.com\/UGREEN-Retractable-Charger-MacBook-AirPods\/dp\/B0DXDT9SKW?tag=zdnet-buy-button-20\" rel=\"noopener nofollow sponsored\" target=\"_blank\" data-aps-asin=\"B0DXDT9SKW\" data-aps-asc-tag=\"zd-buy-button-20\" data-aps-asc-subtag=\"__COM_CLICK_ID__|null|dtp\"><span>Ugreen Nexode retractable USB-C cable<\/span><!----><\/a><\/span> is a must-buy. It&#8217;s practical, reliable, and tough, and it solves all my cable woes in one fell swoop.&nbsp;<\/p>\n<div id=\"pinbox-a9c963f8-e970-43f7-9a75-b0b183f81556\" class=\"c-shortcodePinbox-carousel\">\n<div class=\"c-listingCarouselHorizontal\">\n<h4 class=\"c-sectionHeading\">Featured reviews<\/h4>\n<p> <!----> <span class=\"c-listingCarouselHorizontal_loadingIndicator\"><\/span> <\/div>\n<\/div>\n<p>READ MORE <a href=\"https:\/\/www.zdnet.com\/article\/my-search-for-the-most-durable-usb-c-cable-is-over-this-one-passes-my-brick-test\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Tired of tangled cords, flimsy keychain cables, and retractables that always break? The Ugreen Nexode 100W cable finally gets it right.READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":59356,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[62],"tags":[],"class_list":["post-59355","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-zdnet-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>My search for the most durable USB-C cable is over - this one passes my brick test 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/my-search-for-the-most-durable-usb-c-cable-is-over-this-one-passes-my-brick-test\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"My search for the most durable USB-C cable is over - this one passes my brick test 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/my-search-for-the-most-durable-usb-c-cable-is-over-this-one-passes-my-brick-test\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2025-09-16T00:27:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.zdnet.com\/a\/img\/2025\/09\/09\/22affa08-795b-4ffc-91ba-720f6c2588d7\/img-5136.jpg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/my-search-for-the-most-durable-usb-c-cable-is-over-this-one-passes-my-brick-test\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/my-search-for-the-most-durable-usb-c-cable-is-over-this-one-passes-my-brick-test\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"My search for the most durable USB-C cable is over &#8211; this one passes my brick test\",\"datePublished\":\"2025-09-16T00:27:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/my-search-for-the-most-durable-usb-c-cable-is-over-this-one-passes-my-brick-test\\\/\"},\"wordCount\":589,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/my-search-for-the-most-durable-usb-c-cable-is-over-this-one-passes-my-brick-test\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/09\\\/my-search-for-the-most-durable-usb-c-cable-is-over-this-one-passes-my-brick-test.jpg\",\"articleSection\":[\"ZDNet | Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/my-search-for-the-most-durable-usb-c-cable-is-over-this-one-passes-my-brick-test\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/my-search-for-the-most-durable-usb-c-cable-is-over-this-one-passes-my-brick-test\\\/\",\"name\":\"My search for the most durable USB-C cable is over - this one passes my brick test 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/my-search-for-the-most-durable-usb-c-cable-is-over-this-one-passes-my-brick-test\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/my-search-for-the-most-durable-usb-c-cable-is-over-this-one-passes-my-brick-test\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/09\\\/my-search-for-the-most-durable-usb-c-cable-is-over-this-one-passes-my-brick-test.jpg\",\"datePublished\":\"2025-09-16T00:27:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/my-search-for-the-most-durable-usb-c-cable-is-over-this-one-passes-my-brick-test\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/my-search-for-the-most-durable-usb-c-cable-is-over-this-one-passes-my-brick-test\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/my-search-for-the-most-durable-usb-c-cable-is-over-this-one-passes-my-brick-test\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/09\\\/my-search-for-the-most-durable-usb-c-cable-is-over-this-one-passes-my-brick-test.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/09\\\/my-search-for-the-most-durable-usb-c-cable-is-over-this-one-passes-my-brick-test.jpg\",\"width\":1600,\"height\":900},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/my-search-for-the-most-durable-usb-c-cable-is-over-this-one-passes-my-brick-test\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"My search for the most durable USB-C cable is over &#8211; this one passes my brick test\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"My search for the most durable USB-C cable is over - this one passes my brick test 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/my-search-for-the-most-durable-usb-c-cable-is-over-this-one-passes-my-brick-test\/","og_locale":"en_US","og_type":"article","og_title":"My search for the most durable USB-C cable is over - this one passes my brick test 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/my-search-for-the-most-durable-usb-c-cable-is-over-this-one-passes-my-brick-test\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2025-09-16T00:27:00+00:00","og_image":[{"url":"https:\/\/www.zdnet.com\/a\/img\/2025\/09\/09\/22affa08-795b-4ffc-91ba-720f6c2588d7\/img-5136.jpg","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/my-search-for-the-most-durable-usb-c-cable-is-over-this-one-passes-my-brick-test\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/my-search-for-the-most-durable-usb-c-cable-is-over-this-one-passes-my-brick-test\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"My search for the most durable USB-C cable is over &#8211; this one passes my brick test","datePublished":"2025-09-16T00:27:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/my-search-for-the-most-durable-usb-c-cable-is-over-this-one-passes-my-brick-test\/"},"wordCount":589,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/my-search-for-the-most-durable-usb-c-cable-is-over-this-one-passes-my-brick-test\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/09\/my-search-for-the-most-durable-usb-c-cable-is-over-this-one-passes-my-brick-test.jpg","articleSection":["ZDNet | Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/my-search-for-the-most-durable-usb-c-cable-is-over-this-one-passes-my-brick-test\/","url":"https:\/\/www.threatshub.org\/blog\/my-search-for-the-most-durable-usb-c-cable-is-over-this-one-passes-my-brick-test\/","name":"My search for the most durable USB-C cable is over - this one passes my brick test 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/my-search-for-the-most-durable-usb-c-cable-is-over-this-one-passes-my-brick-test\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/my-search-for-the-most-durable-usb-c-cable-is-over-this-one-passes-my-brick-test\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/09\/my-search-for-the-most-durable-usb-c-cable-is-over-this-one-passes-my-brick-test.jpg","datePublished":"2025-09-16T00:27:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/my-search-for-the-most-durable-usb-c-cable-is-over-this-one-passes-my-brick-test\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/my-search-for-the-most-durable-usb-c-cable-is-over-this-one-passes-my-brick-test\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/my-search-for-the-most-durable-usb-c-cable-is-over-this-one-passes-my-brick-test\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/09\/my-search-for-the-most-durable-usb-c-cable-is-over-this-one-passes-my-brick-test.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/09\/my-search-for-the-most-durable-usb-c-cable-is-over-this-one-passes-my-brick-test.jpg","width":1600,"height":900},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/my-search-for-the-most-durable-usb-c-cable-is-over-this-one-passes-my-brick-test\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"My search for the most durable USB-C cable is over &#8211; this one passes my brick test"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/59355","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=59355"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/59355\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/59356"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=59355"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=59355"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=59355"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}