Latest Tech News

Stay updated with the latest in technology, AI, cybersecurity, and more

Filtered by: file Clear Filter

Benben: An audio player for the terminal, written in Common Lisp

Benben Benben is a fast and efficient command line audio player and audio converter for Linux and other Unix-like systems with an oldschool-inspired interface. It supports multiple formats, and is especially suited to people who organize their music in folders, and for those who prefer to use terminals instead of GUIs. Starting with v0.7.0, it is written almost entirely in the Common Lisp programming language. The latest release is v0.6.1, released on December 22nd, 2024. Benben is entirely w

LibreOffice slams Microsoft for locking in Office users w/ complex file formats

When you purchase through links on our site, we may earn an affiliate commission. Here’s how it works LibreOffice has been on the offensive lately, taking the time to call out Microsoft and its practices whenever it can. Now, it is at it again, accusing Microsoft of "intentionally" using "unnecessarily complex" file formats to achieve user lock-in with its Microsoft 365 (Office) documents. For those who don't know, XML is a markup language that programs like Microsoft 365 and LibreOffice use t

New Phobos ransomware decryptor lets victims recover files for free

The Japanese police have released a Phobos and 8-Base ransomware decryptor that lets victims recover their files for free, with BleepingComputer confirming that it successfully decrypts files. Phobos is a ransomware-as-a-service operation that launched in December 2018, enabling other threat actors to join as affiliates and utilize their encryption tool in attacks. In exchange, any ransom payments were split between the affiliate and the operators. While the ransomware operation did not receiv

Zuckerberg and Meta investors reach settlement in $8B privacy case

In Brief Mark Zuckerberg and other current and former Meta executives have settled a lawsuit filed by a group of shareholders. They were seeking $8 billion for the damage the executives caused the company by allowing repeated violations of Facebook users’ privacy in relation to the Cambridge Analytica scandal. The parties did not disclose details of the settlement, according to Reuters. Facebook shareholders filed a lawsuit against Mark Zuckerberg, former COO Sheryl Sandberg, and other execut

DOGE Put Free Tax Filing Tool on Chopping Block After One Meeting With Lobbyists

When the so-called Department of Government Efficiency (DOGE) arrived at the Internal Revenue Service earlier this year, leaders of the group reassured workers that the agency’s free tax filing tool, Direct File, would be spared from cuts. But only a few days after meeting with tax software lobbyists, the beloved tool was placed on the chopping block, multiple sources familiar tell WIRED. The plans to potentially kill Direct File, the free tax filing tool developed by the IRS which services 25

Topics: direct file free irs tax

Is Apple's AirDrop Not Working for You? Here's How to Fix It

AirDrop has always been a quick and convenient way to transfer files between Apple's devices. You can use it to easily share photos, documents, videos, audio recordings, contact cards, web links, notes and other data between iPads, iPhones and Macs. You can also use AirDrop to transfer those files to nearby contacts (as long as they have iOS or MacOS) and it works with any iOS device with iOS 7 or newer and Macs running OS X Yosemite or newer. For a detailed explanation of how to use AirDrop, c

TikTok lures songwriters with new promotional features

TikTok is adding new features to its app to let songwriters highlight their works. These features, rolling out in beta, include a “Songwriter” label and a new tab on their profile to show off their musical works. This can help songwriters market themselves better to potential clients. The company said a limited number of publishing partners and songwriters have access to the new label and the music highlight section. Songwriters and publishers who want to be part of the program will have to joi

TikTok is adding features for songwriters to its app

TikTok is adding new features to its app to let songwriters highlight their works. These features, rolling out in beta, include a “Songwriter” label and a new tab on their profile to show off their musical works. This can help songwriters market themselves better to potential clients. The company said a limited number of publishing partners and songwriters have access to the new label and the music highlight section. Songwriters and publishers who want to be part of the program will have to joi

Show HN: Timep – a next-gen profiler and flamegraph-generator for bash code

timep timep is an efficient and state-of-the-art trap-based time profiler for bash code. timep generates a per-command execution time profile for the bash code being profiled. As it generates this profile, timep logs command runtimes+metadata hierarchically based on both function and subshell nesting depth, mapping and recreating the complete full call-stack tree for the bash code being profiled. BUILTIN FLAMEGRAPH GENERATOR: One standout feature of timep is that, in addition to the time profi

6 ways to protect your passport and other travel docs from cybercriminals - before it's too late

Elyse Betters Picaro / ZDNET You may think that your physical passport, boarding passes, and ID cards are protected from theft as long as you keep them safe and secure. But that's not necessarily the case. If those documents are scanned or stored in the cloud, they're just as vulnerable as other types of files. Also: I never travel without these 5 security gadgets and accessories. Here's why A new report from NordVPN describes how your travel documents can be accessed and exploited and what y

Samsung fixes the Secure Folder flaw that let anyone see what apps you’re hiding

Mishaal Rahman / Android Authority TL;DR Samsung has patched a Secure Folder flaw that previously allowed anyone with physical access to see your hidden apps and photos. The vulnerability existed because Secure Folder was implemented as a “work profile,” which key system components didn’t recognize as a highly secure space. One UI 8 reclassifies Secure Folder as a “private” profile, ensuring system apps now correctly hide its sensitive files and app information from view. Samsung’s Secure Fo

I found a better way to transfer files between Android and Linux - and it's free

nailzchap/Getty Images I often need to send a file from my Pop!_OS Linux desktop to my Android device. Over the years, I've found a variety of solutions, but this latest option -- called Packet -- makes transferring files between Linux and Android a breeze. Packet works with Quick Share. The only requirement is that both desktop and mobile devices be on the same wireless network. Also: Two new Android 16 security features protect you better - how to switch them on now Let me show you how to

Encrypting files with passkeys and age

Typage ( age-encryption on npm) is a TypeScript implementation of the age file encryption format. It runs with Node.js, Deno, Bun, and browsers, and implements native age recipients, passphrase encryption, ASCII armoring, and supports custom recipient interfaces, like the Go implementation. However, running in the browser affords us some special capabilities, such as access to the WebAuthn API. Since version 0.2.3, Typage supports symmetric encryption with passkeys and other WebAuthn credential

Topics: age file key prf webauthn

‘Whatever She Thinks Is Credible’: Trump Says Pam Bondi Should Release Part of Epstein Files

President Donald Trump angered his own supporters recently when his U.S. Department of Justice said it wouldn’t be releasing any more information about the late sex offender Jeffrey Epstein. But after days of outrage, including from the Deputy Director of the FBI, Dan Bongino, Trump is now signaling that Attorney General Pam Bondi might release something. Still, don’t expect to see anything that would make Trump look bad. Trump spoke to reporters outside the White House on Tuesday and was asked

Encrypting Files with Passkeys and Age

Typage ( age-encryption on npm) is a TypeScript implementation of the age file encryption format. It runs with Node.js, Deno, Bun, and browsers, and implements native age recipients, passphrase encryption, ASCII armoring, and supports custom recipient interfaces, like the Go implementation. However, running in the browser affords us some special capabilities, such as access to the WebAuthn API. Since version 0.2.3, Typage supports symmetric encryption with passkeys and other WebAuthn credential

Topics: age file key prf webauthn

These 6 Linux file managers are way better than your default

D3Damon/Getty The file manager might not be a feature on your desktop that you've ever considered changing, but once you've seen a better option, you can't unsee it. I've used nearly every file manager on the market, and some are far better than others. Also: 5 Linux file and folder management commands you need to know If you find the file manager on your Linux desktop of choice isn't cutting it, here are six alternatives. One of these could well become your favorite Linux file manager. 1. K

Interlock ransomware adopts new FileFix attack to push malware

Hackers have adopted the new technique called 'FileFix' in Interlock ransomware attacks to drop a remote access trojan (RAT) on targeted systems. Interlock ransomware operations have increased over the past months as the threat actor started using the KongTuke web injector (aka 'LandUpdate808') to deliver payloads through compromised websites. This shift in modus operandi was observed by researchers at The DFIR Report and Proofpoint since May. Back then, visitors of compromised sites were prom

Android malware Konfety uses malformed APKs to evade detection

A new variant of the Konfety Android malware emerged with a malformed ZIP structure along with other obfuscation methods that allow it to evade analysis and detection. Konfety poses as a legitimate app, mimicking innocuous products available on Google Play, but features none of the promised functionality. The capabilities of the malware include redirecting users to malicious sites, pushing unwanted app installs, and fake browser notifications. Instead, it fetches and renders hidden ads using

WeTransfer says files not used to train AI after backlash

WeTransfer says files not used to train AI after backlash The firm has now updated its terms, saying it has "made the language easier to understand" to avoid confusion. A WeTransfer spokeswoman told BBC News: "We don't use machine learning or any form of AI to process content shared via WeTransfer, nor do we sell content or data to any third parties." The file sharing company had received lots of criticism from customers on social media after changing its terms of service, which some interpre

Show HN: VS Code extension to edit the filesystem like a text buffer

Voil View on the Visual Studio Marketplace. Youtube video showing voil features: https://www.youtube.com/watch?v=c_L0c7rcYLs&t=5s. Edit file system like a text buffer (similar to oil.nvim). Create new files/directories by typing their names in the editor (names ending with / are treated as directories). Convert your existing text-editing skills to file system manipulation skills, as opposed of the vscode's default file explorer which requires mouse interaction or memorizing new keybinds (and

Show HN: CallFS – S3-style object store in one Go binary (MIT)

CallFS: A High-Performance, Distributed REST API Filesystem CallFS is an ultra-lightweight, high-performance REST API filesystem that provides precise Linux filesystem semantics over various backends, including local storage, Amazon S3, and a distributed peer-to-peer network. It is designed for speed, reliability, and horizontal scalability. 🚀 Key Features Multi-Backend Storage : Seamlessly use Local Filesystem, Amazon S3, or other S3-compatible services (like MinIO) as storage backends. : S

Interlock ransomware adopts FileFix method to deliver malware

Hackers have adopted the new technique called 'FileFix' in Interlock ransomware attacks to drop a remote access trojan (RAT) on targeted systems. Interlock ransomware operations have increased over the past months as the threat actor started using the KongTuke web injector (aka 'LandUpdate808') to deliver payloads through compromised websites. This shift in modus operandi was observed by researchers at The DFIR Report and Proofpoint since May. Back then, visitors of compromised sites were prom

Embedding user-defined indexes in Apache Parquet

Embedding User-Defined Indexes in Apache Parquet Files Posted on: Mon 14 July 2025 by Qi Zhu, Jigao Luo, and Andrew Lamb It’s a common misconception that Apache Parquet files are limited to basic Min/Max/Null Count statistics and Bloom filters, and that adding more advanced indexes requires changing the specification or creating a new file format. In fact, footer metadata and offset-based addressing already provide everything needed to embed user-defined index structures within Parquet files w

Embedding User-Defined Indexes in Apache Parquet

Embedding User-Defined Indexes in Apache Parquet Files Posted on: Mon 14 July 2025 by Qi Zhu, Jigao Luo, and Andrew Lamb It’s a common misconception that Apache Parquet files are limited to basic Min/Max/Null Count statistics and Bloom filters, and that adding more advanced indexes requires changing the specification or creating a new file format. In fact, footer metadata and offset-based addressing already provide everything needed to embed user-defined index structures within Parquet files w

Discord's virtual Orbs currency is now available for everyone to earn

Discord has begun rolling out its in-app Orbs currency to everyone. In conjunction with the platform's Quest system, users can earn Orbs by watching ads on Discord. You can then use the currency to purchase exclusive drip for your profile, including badges, effects and avatars. It's also possible to exchange Orbs for three-day Nitro credits and anything else you can buy on the Discord Shop. Sometimes developers will also offer the currency in exchange for simply trying out their game, or comple

Lost Chapter of Automate the Boring Stuff: Audio, Video, and Webcams in Python

The third edition of Automate the Boring Stuff with Python is now available for purchase or to read for free online. It has updated content and several new chapters, but one chapter that was left on the cutting room floor was "Working with Audio, Video, and Webcams". I present the 26-page rough draft chapter in this blog, where you can learn how to write Python code that records and plays multimedia content. Working with Audio, Video, and Webcams These days a smartphone is a portable film st

Metadata Shows the FBI’s ‘Raw’ Jeffrey Epstein Prison Video Was Likely Modified

The United States Department of Justice this week released nearly 11 hours of what it described as “full raw” surveillance footage from a camera positioned nearby Jeffrey Epstein’s prison cell the night before he was found dead. The release was intended to address conspiracy theories about Epstein’s apparent suicide in federal custody. But instead of putting those suspicions to rest, it may fuel them further. Metadata embedded in the video and analyzed by WIRED and independent video forensics e

This SSD docking station proved to be one of the best investments for my PC (and it's on sale)

ZDNET's key takeaways The Sabrent USB SSD 4-bay docking station is available now on Amazon for $72. This docking station makes adding external drives to your system a total plug-and-play affair. The case is plastic, so it feels a bit cheap but that doesn't get in the way of performance. View now at Amazon At Amazon, the Sabrent USB SSD docking station is currently on sale for $72, a savings of $18. It seems I'm always running out of room on my iMac drives. Why? Video files. You see, I film m

Koala: A benchmark suite for performance-oriented shell-optimization research

The Koala Benchmark Suite Benchmarks | Quick Setup | More Info | License For issues and ideas, open a GitHub issue. Koala is a benchmark suite aimed at the characterization of performance-oriented research targeting the POSIX shell. It consists of 14 sets of real-world shell programs from diverse domains ranging from CI/CD and AI/ML to biology and the humanities. They are accompanied by real inputs that facilitate small- and large-scale performance characterization and varying opportunities f