Latest Tech News

Stay updated with the latest in technology, AI, cybersecurity, and more

Filtered by: used Clear Filter

A Dangerous Worm Is Eating Its Way Through Software Packages

New findings this week showed that a misconfigured platform used by the Department of Homeland Security left sensitive national security information—including data related to the surveillance of Americans—exposed and accessible to thousands of people. Meanwhile, 15 New York officials were arrested by Immigration and Customs Enforcement and the New York Police Department this week in or around 26 Federal Plaza—where ICE detains people in what courts have ruled are unsanitary conditions. Russia c

Security News This Week: A Dangerous Worm Is Eating Its Way Through Software Packages

New findings this week showed that a misconfigured platform used by the Department of Homeland Security left sensitive national security information—including data related to the surveillance of Americans—exposed and accessible to thousands of people. Meanwhile, 15 New York officials were arrested by Immigration and Customs Enforcement and the New York Police Department this week in or around 26 Federal Plaza—where ICE detains people in what courts have ruled are unsanitary conditions. Russia c

Ukraine Destroys Legendary Soviet-Era Telescope Once Used to Phone Aliens

Ukrainian defense forces destroyed a giant radio telescope in Crimea, a powerful planetary transmitter once used to support deep space missions and METI—the attempt to message extraterrestrial civilizations. Ukraine destroyed Yevpatoria RT-70 in a drone attack to prevent Russia from using it for military communication purposes, Space.com reported. Russian defense forces reportedly carried out recent upgrades to the telescope to support attacks on Ukrainian territory, but the 230-foot (70-meter)

Grade 2 Braille

Tactile writing system for English English Braille, also known as Grade 2 Braille,[1] is the braille alphabet used for English. It consists of around 250 letters (phonograms), numerals, punctuation, formatting marks, contractions, and abbreviations (logograms). Some English Braille letters, such as ⠿ ⟨for⟩,[2] correspond to more than one letter in print. There are three levels of complexity in English Braille. Grade 1 is a nearly one-to-one transcription of printed English and is restricted to

ShinyHunters claims 1.5 billion Salesforce records stolen in Drift hacks

The ShinyHunters extortion group claims to have stolen over 1.5 billion Salesforce records from 760 companies using compromised Salesloft Drift OAuth tokens. For the past year, the threat actors have been targeting Salesforce customers in data theft attacks using social engineering and malicious OAuth applications to breach Salesforce instances and download data. The stolen data is then used to extort companies into paying a ransom to prevent the data from being publicly leaked. These attacks

The Best Ventless Fireplaces for Cozy Vibes (2025)

The Lloyd from Solo Stove pays serious homage to the freestanding mid-century enameled MCM Preway fireplaces that fetch thousands on the vintage marketplace. For less than $1,000 and a few minutes of assembly, the Lloyd may be a solution for those who want a real flicker. The Lloyd comes in five easy-to-love colors and most resembles the OG Malm Zircon. Made of electroplated steel, metal, and glass, the 31-pound Lloyd stands 3.5 feet tall. The Lloyd uses TerraFlame gel fuel, a proprietary blend

Topics: flame fuel gel lloyd used

FBI warns of UNC6040, UNC6395 hackers stealing Salesforce data

The FBI has issued a FLASH alert warning that two threat clusters, tracked as UNC6040 and UNC6395, are compromising organizations’ Salesforce environments to steal data and extort victims. "The Federal Bureau of Investigation (FBI) is releasing this FLASH to disseminate Indicators of Compromise (IOCs) associated with recent malicious cyber activities by cyber criminal groups UNC6040 and UNC6395, responsible for a rising number of data theft and extortion intrusions," reads the FBI's FLASH advis

We Rarely Lose Technology (2023)

“Στόλος Ρωμαίων πυρπολῶν τὸν τῶν ἐναντίων στόλον,” i.e. “the fleet of the Romans setting ablaze the fleet of the enemies.” i.e. the Byzantines using their Greek Fire weapon. From the Codex Skylitzes Matritensis (12th century) A common trope in the land of fantasy fiction and games is that of lost technology. The hero stumbles upon some ancient ruins, and then finds an ancient weapon, or an ancient vehicle, or an ancient intelligent robot, that helps him in his quest. Nobody alive could possibly

SQLite's Use of Tcl (2017)

SQLite's Use Of Tcl D. Richard Hipp 24th Annual Tcl/Tk Conference Houston, TX 2017-10-19 1.0 Introduction SQLite is a TCL extension that has escaped into the wild. The design of SQLite was inspired by the design of TCL, both in the way it handles datatypes and in the formatting of its source code. The index use case for SQLite was in a Tcl/Tk application for an industrial company. From its inception, SQLite has always depended heavily on TCL. These days, SQLite no longer uses TCL internal

SQLite's Use of Tcl

SQLite's Use Of Tcl D. Richard Hipp 24th Annual Tcl/Tk Conference Houston, TX 2017-10-19 1.0 Introduction SQLite is a TCL extension that has escaped into the wild. The design of SQLite was inspired by the design of TCL, both in the way it handles datatypes and in the formatting of its source code. The index use case for SQLite was in a Tcl/Tk application for an industrial company. From its inception, SQLite has always depended heavily on TCL. These days, SQLite no longer uses TCL internal

Museum of Color

Listen to this Story Narrated by Stephanie Krzywonos Contributor Bios Writer Stephanie Krzywonos is a Xicana nonfiction writer. Her forthcoming debut book is Ice Folx, an intersectional memoir set in the Antarctic underworld. She has written about her experiences on “the Ice” for Sierra Magazine, Ofrenda Magazine, The Willowherb Review, Kosmos Journal, The Dark Mountain Project, The Behemoth, and The Antarctic Sun. Artist Studio Airport, founded by Bram Broerse and Maurits Wouters, is an interdi

My favorite cordless screwdriver of all time can handle any task for me (and it's on sale)

Bosch GO 3 cordless screwdriver ZDNET's key takeaways This pro-quality screwdriver has held up to heavy use for over six months Fast charging and a large battery keep it running all day It's now selling at its lowest price yet. $79.9 at Amazon Follow ZDNET: Add us as a preferred source on Google. When it comes to some things, a review when something is a few weeks old really doesn't do it justice. You need time to put it through its paces to make sure that it really is as good as it seems.

Why this Bosch screwdriver is my new all-time favorite tool (and it charges with USB-C)

Bosch GO 3 cordless screwdriver ZDNET's key takeaways This pro-quality screwdriver has held up to heavy use for over six months Fast charging and a large battery keep it running all day It's now selling at its lowest price yet. $79.9 at Amazon Follow ZDNET: Add us as a preferred source on Google. When it comes to some things, a review when something is a few weeks old really doesn't do it justice. You need time to put it through its paces to make sure that it really is as good as it seems.

Translation startup DeepL launches an AI 'agent' in challenge to players like OpenAI

German startup DeepL on Wednesday said it was expanding beyond artificial intelligence-powered translation into general AI agents focused on businesses. The term "agent" refers to an AI tool that can carry out tasks in the background in response to user prompts. DeepL Agent is designed to complete "repetitive, time-intensive tasks across a wide variety of functions" according to the company. It can responds to natural langauge commands from a users. DeepL Agent can be used in various teams fro

Luigi Mangione's likeness used to model shirt on Shein

Luigi Mangione's likeness used to model shirt on Shein A spokesperson from Shein told BBC News: "The image in question was removed immediately upon discovery." It is thought the product he appeared to be modelling was on sale for just under $10 (£7.50). An image with his likeness, which appeared to show him wearing a white, short-sleeved shirt, appeared on the fast-fashion website until its removal. Fast-fashion giant Shein has launched an investigation after an image of Luigi Mangione - acc

This Bosch screwdriver looks rough after 7 months, but it's still my #1 - here's why

Bosch GO 3 cordless screwdriver ZDNET's key takeaways This pro-quality screwdriver has held up to heavy use for over six months Fast charging and a large battery keep it running all day It's now selling at its lowest price yet. $89.99 at Amazon Follow ZDNET: Add us as a preferred source on Google. When it comes to some things, a review when something is a few weeks old really doesn't do it justice. You need time to put it through its paces to make sure that it really is as good as it seems.

Hardware Flaw in Apple A16 Chip: Debug Logic Active on Production Devices

A16-FuseBypass: Debug Logic Enabled on Production Apple Silicon Overview This repository documents a critical hardware-level vulnerability in the Apple A16 Bionic chip used in iPhone 14 Pro Max and related devices. The flaw allows debug logic—meant strictly for development silicon—to be executed on production-fused devices ( dev-fused = 0 ) running stock, unmodified iOS with debug = 0x0 . No jailbreak. No provisioning profile. No tampering. Just flawed hardware trust enforcement. Summary of

Police seize VerifTools fake ID marketplace servers, domains

The FBI and the Dutch Police have shut down the VerifTools marketplace for fraudulent identity documents after seizing servers in Amsterdam that hosted the online operation. VerifTools was a prominent platform that produced and intermediated the purchase of fake documents (e.g. driver's licenses, passports) that were used to bypass various identity verification systems or to assume an identity, either stolen or fabricated. The police note that such sites are used in bank fraud, phishing, helpd

AI firm says its technology weaponised by hackers

AI firm says its technology weaponised by hackers 3 hours ago Share Save Imran Rahman-Jones Technology reporter Share Save Getty Images US artificial intelligence (AI) company Anthropic says its technology has been "weaponised" by hackers to carry out sophisticated cyber attacks. Anthropic, which makes the chatbot Claude, says its tools were used by hackers "to commit large-scale theft and extortion of personal data". The firm said its AI was used to help write code which carried out cyber-at

Hackers used AI to 'to commit large-scale theft', says Anthropic

Hackers used AI to 'to commit large-scale theft', says Anthropic 1 hour ago Share Save Imran Rahman-Jones Technology reporter Share Save Getty Images US artificial intelligence (AI) company Anthropic says its technology has been "weaponised" by hackers to carry out sophisticated cyber attacks. Anthropic, which makes the chatbot Claude, says its tools were used by hackers "to commit large-scale theft and extortion of personal data". The firm said its AI was used to help write code which carrie

It's the perfect time to buy a cheap used EV

Early this summer, my wife and I had an inconvenient realization: we may need to be in two places at once. An urgent doctor appointment could conflict with YMCA day camp pickup, or our kids would get invited to two birthday parties on the same morning at godforsaken activity centers in separate towns. There was no doubt we needed another car. A big ticket purchase seemed unjustifiable when we don't know what eggs will cost next month — and my search for an aftermarket Prius within my budget was

Topics: 000 ev evs miles used

Hackers used AI to 'to commit large-scale theft'

Hackers used AI to 'to commit large-scale theft' 21 minutes ago Share Save Imran Rahman-Jones Technology reporter Share Save Getty Images A top artificial intelligence (AI) company says the technology has been "weaponised" by hackers to carry out sophisticated cyber attacks. Anthropic, which makes the chatbot Claude, says its tools were used by hackers "to commit large-scale theft and extortion of personal data". The firm said its AI was used to help write code which carried out cyber-attacks

Fix damaged art in hours with AI

In his study, Alex Kachkine, SM ’23, presents a new method he’s developed that involves printing the restoration on a very thin polymer film that can be carefully aligned with a painting and adhered to it or easily removed. As a demonstration, he used the method to repair a highly damaged 15th-century oil painting he owned. First he used traditional techniques to clean the painting and remove any past restoration efforts. Then he scanned the painting, including the many regions where paint had f

Silk Typhoon hackers hijack network captive portals in diplomat attacks

State-sponsored hackers linked to the Silk Typhoon activity cluster targeted diplomats by hijacking web traffic to redirect to a malware-serving website. The hackers used an advanced adversary-in-the-middle (AitM) technique to hijack the captive portal of the network and send the target to the first-stage malware. Google Threat Intelligence Group (GTIG) tracks the threat actor as UNC6384 and, based on tooling, targeting, and infrastructure, believes it is associated with the Chinese threat act

Japan has opened its first osmotic power plant

Japan has opened its first osmotic power plant, in the south-western city of Fukuoka. Only the second power plant of its type in the world, it is expected to generate about 880,000 kilowatt hours of electricity each year – enough to help power a desalination plant that supplies fresh water to the city and neighbouring areas. That’s the equivalent of powering about 220 Japanese households, according to Dr Ali Altaee from the University of Technology Sydney (UTS), who specialises in the developm

Blast from the past: Facit A2400 terminal

The year is (roughly) 1989, and we have a small office with some Unix computers and a handful of Facit A2400 terminals connected to them. What we love most about these terminals is they are positive terminals with black text on a white background. We “grew up” with green on black and, later at Nixdorf Computer AG, with amber on black. Young readers might be surprised we used to get printed manuals with our terminals (and computers); don’t forget, the Web didn’t exist then, and “download the man

Cornell's world-first 'microwave brain' computes differently

Researchers at Cornell University have developed an electronic chip that they describe as a "microwave brain." The simplified chip is analog rather than digital, yet can process ultrafast data and wireless communication signals simultaneously. We are so used to thinking of computers as digital machines running on binary code that it's easy to forget that these are only one type of computer. In fact, both historically and today, many devices that we can classify as computers are analog in functi

Is the Flipper Zero the next big car theft gadget?

is transportation editor with 10+ years of experience who covers EVs, public transportation, and aviation. His work has appeared in The New York Daily News and City & State. Posts from this author will be added to your daily email digest and your homepage feed. 404 Media has a report out about an underground software market that enables the Flipper Zero to be used to unlock a wide variety of vehicles, including Ford, Audi, Volkswagen, Subaru, Hyundai, Kia, and several other models. The hack w

Topics: 404 boys flipper kia used

Sütterlin

Historical form of German handwriting, used 1915–1970s Sütterlinschrift (German pronunciation: [ˈzʏtɐliːnˌʃʁɪft], "Sütterlin script") is the last widely used form of Kurrent, the historical form of German handwriting script that evolved alongside German blackletter (most notably Fraktur) typefaces. Graphic artist Ludwig Sütterlin was commissioned by the Prussian Ministry of Science, Art and Culture (Preußisches Ministerium für Wissenschaft, Kunst und Volksbildung) to create a modern handwriting