Feeds

Ten PlayStation 3 games you may have missed

The Sony side of the street

High performance access to file storage

Transformers: Fall of Cybertron

RH Numbers

High Moon Studios' Transformers outings have earned a fair amount of respect, due mainly to the franchise authenticity and the fact that none of its games are typical Activision movie tie-ins. This successor to the fairly well-received War for Cybertron, continues to stick its finger up to Michael Bay's recent cash cows and does so through true Transformer grittiness.

Sure, it plays like the average shooter it is – with a serious hat tip to Gears of War – but you'll have more fun churning through its repetitive levels than you would wincing at Bay's cheese-ball Hollywood explosions. I did, anyway.

Players take control of an Autobot for half the game, before switching to the Decepticon dark side for the remainder. Without giving much away, the finale is a predictable but entertaining mish-mash of the two, where players are forced into choosing which side of the moral fence they lie. It's hardly a game that'll leave a lasting impression, but certainly has its merits and might be worth picking up for a rainy weekend of button bashing.

Transformers: Fall of Cybertron
Transformers: Fall of Cybertron
Reg Rating 70%
Price £25
Platforms PS3, Xbox 360, PC
More info Activision

The Unfinished Swan

RH Numbers

This downloadable indie title is a hugely original concept that proves there is plenty of untapped innovation in the pool of games design. Players start off in a completely blank world, controlling an orphan that throws paint around in order to find his way.

You're actually on the hunt for a swan that went missing from one of your late mother's paintings and dived into the blank canvas in search of it. As the world around is unveiled, further features – such as chucking water to grow vines – must be discovered and used to solve puzzles. It isn't by any means a lengthy game, but it's certainly an enjoyable experience and one unlike any other on offer. You'll come away feeling like you've just had a lucid dream. ®

The Unfinished Swan
The Unfinished Swan
Reg Rating 90%
Price £10
Platforms PSN
More info Giant Sparrow

High performance access to file storage

More from The Register

next story
Report: Apple seeking to raise iPhone 6 price by a HUNDRED BUCKS
'Well, that 5c experiment didn't go so well – let's try the other direction'
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Nvidia gamers hit trifecta with driver, optimizer, and mobile upgrades
Li'l Shield moves up to Android 4.4.2 KitKat, GameStream comes to notebooks
Gimme a high S5: Samsung Galaxy S5 puts substance over style
Biometrics and kid-friendly mode in back-to-basics blockbuster
AMD unveils Godzilla's graphics card – 'the world's fastest, period'
The Radeon R9 295X2: Water-cooled, 5,632 stream processors, 11.5TFLOPS
Sony battery recall as VAIO goes out with a bang, not a whimper
The perils of having Panasonic as a partner
NORKS' own smartmobe pegged as Chinese landfill Android
Fake kit in the hermit kingdom? That's just Kim Jong-un-believable!
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.