Latest Tech News

Stay updated with the latest in technology, AI, cybersecurity, and more

Filtered by: acc Clear Filter

Amazon set to report earnings: AI and tariffs are key to the second quarter

Amazon will report second-quarter results after the market close Thursday. Here's what analysts surveyed by LSEG are expecting: Earnings per share: $1.33 $1.33 Revenue: $162.09 billion Wall Street is also looking at other key revenue metrics: Amazon Web Services: $30.8 billion, according to StreetAccount $30.8 billion, according to StreetAccount Advertising: $14.99 billion, according to StreetAccount The company spooked investors in May when it warned in its earnings report that "tariff a

Show HN: The easiest accessibility (a11y) checker for VSCode

Be-a11y VSCode Extension A Visual Studio Code extension for running accessibility audits using be-a11y. This extension allows you to analyze your project or a remote website for accessibility issues directly from VSCode. Results are presented in a convenient way and can be saved for further review. Features Run accessibility audits on the current workspace (local project) or any URL View results directly in VSCode Save the latest accessibility report to a file All actions available in the

States Are Moving to Protect Access to Vaccines

With US Health and Human Services Secretary Robert F. Kennedy, Jr. already shaking up federal vaccine policy, some states are stepping in to preserve access to lifesaving shots in anticipation of further changes. The federal government has historically had a major influence on vaccine policy through the Advisory Committee on Immunization Practices (ACIP), formed in 1964 to develop science-based recommendations on how vaccines should be used. The recommendations are almost always adopted by the

Amazon earnings primer: Why AI and tariffs are key to the second quarter

Amazon will report second-quarter results after the market close Thursday. Here's what analysts surveyed by LSEG are expecting: Earnings per share: $1.33 $1.33 Revenue: $162.1 billion Wall Street is also looking at other key revenue metrics: Amazon Web Services: $30.8 billion, according to StreetAccount $30.8 billion, according to StreetAccount Advertising: $14.99 billion, according to StreetAccount The company spooked investors in May when it warned in its earnings report that "tariff an

Not just YouTube: Google is using AI to guess your age based on your activity - everywhere

Elyse Betters Picaro / ZDNET ZDNET's key takeaways Google is implementing a new AI-powered age verification method. Machine learning will analyze your activity (mostly on YouTube) to guess your age. If AI guesses wrong, you'll need to go through a verification process. A day after announcing AI-powered age verification on YouTube, which we explained in more detail yesterday, Google is launching it on a larger scale, and again it's on you to sort out any problems if AI guesses wrong. Also:

Microsoft suddenly bans LibreOffice developer's email account, blocks appeal

Recap: The developers of LibreOffice, a free and open-source alternative to Microsoft Office, have repeatedly criticized Microsoft's proprietary software policies over the past few months. Although a recent incident involving Microsoft and a LibreOffice developer has no known connection to the rivalry, it could spark further criticism of the Windows provider. When LibreOffice developer Mike Kaganski attempted to send an email to the productivity suite's developer mailing list using a Hotmail ad

Traccar: an open source GPS tracking system

Overview Traccar is an open source GPS tracking system. This repository contains Java-based back-end service. It supports more than 200 GPS protocols and more than 2000 models of GPS tracking devices. Traccar can be used with any major SQL database system. It also provides easy to use REST API. Other parts of Traccar solution include: There is also a set of mobile apps that you can use for tracking mobile devices: Features Some of the available features include: Real-time GPS tracking Dri

No, an Apple support Weibo account didn’t promote a Samsung foldable phone [Updated]

Update 11:19 a.m. PT: Here’s a statement from an Apple spokesperson: “Apple Support has only posted Apple content. We are working with Weibo to understand how this happened.” What seems to have happened here is that a Weibo client-side bug caused the text of the Apple Support post to be mismatched with the Samsung video. Original story below. An official Apple support account on China’s Weibo social network managed to accidentally post a promotional video for a Samsung folding phone. The emb

How to get another free year of updates for your Windows 10 PC

If your PC meets those conditions, you'll enroll in the ESU program by opening the Settings app and clicking Windows Update. You should see a status message telling you that Windows 10 updates end in October of 2025, with an "enroll now" link you can click to enroll in the Extended Security Updates program. Windows 10 users whose PCs meet the conditions for the ESU program will start seeing this status message about the end of support, along with an enrollment link. Credit: Andrew Cunningham I

Robinhood's 175% rally this year is best among U.S. tech stocks

As Robinhood investors await second-quarter earnings, expectations are sky-high. The online broker, known for popularizing stock and crypto trading with young investors, has seen its shares surge 177% this year, outpacing all other U.S. tech companies valued at $5 or more, excluding those that went public in 2025. The next best performer is Palantir , up 107%. Robinhood's pop this year follows a 192% rally in 2024. The company's market cap now sits at $91 billion, putting it slightly behind Co

PSA: New ‘choicejacking’ attacks can steal your Android or iPhone’s data without your knowledge

Mishaal Rahman / Android Authority TL;DR Researchers have identified new methods to exploit backdoors into Android and iOS to steal data. “Choicejacking” is an evolution of the infamous juice jacking technique and also uses a rigged USB charger or cable to initiate data theft on your mobile devices. Choicejacking uses a combination of techniques to bypass existing juice jacking protection while faking user input to enable permissions illicitly. Juice jacking is a decade-old technique where h

Official Apple support account accidentally promoted a Samsung foldable phone [Video]

An official Apple support account on China’s Weibo social network managed to accidentally post a promotional video for a Samsung folding phone. The embarrassing mistake coincided with a new analyst report on the expected price and timing for Apple’s own move into this market, with an upcoming iPhone Fold … The iPhone Fold Apple has long been working on a foldable iPhone, but has so far been waiting for the tech to be good enough to meet the company’s standards for such a device. In particula

The 8 Best Amazon Echo and Alexa Speakers (2025): We’ve Tested Them All

Other Alexa (or Alexa Compatible) Speakers Amazon Echo Pop for $40: The Echo Pop is a perfectly fine little speaker, and the cutest one in Amazon's lineup. Does it have great sound? No. It's fine enough for background tunes or if you're limited to a dorm room, but you'll get much better sound for a similar size from the Echo Dot (but you'll pay a little more, and you won't get as cute of colors!) Amazon Echo Show 5 (3rd Gen) for $90: This smart display is another just-fine option, but it's too

ACM Transitions to Full Open Access

ACM's Transition to Full Open Access: A New Era for Computing Research For more than seven decades, ACM has played a pivotal role in advancing computing research, fostering collaboration, and disseminating knowledge through its world-class Digital Library, influential publications, and premier conferences. In a significant step to broadening access to computing research, ACM is transitioning to a fully Open Access (OA) publishing model by the end of 2025. This bold move marks a pivotal moment

Microsoft bans LibreOffice developer's account without warning, rejects appeal

When you purchase through links on our site, we may earn an affiliate commission. Here’s how it works Recently, we reported on LibreOffice, accusing Microsoft of intentionally using complex file formats as a tactic to lock in users to Microsoft Office, hindering open source alternatives like LibreOffice. Now, Microsoft has banned LibreOffice developer, Mike Kaganski, from using its services, citing an "activity that violates [its] Services Agreement". According to Mike, this happened last Mon

YouTube is turning over age verification to AI

YouTube will start using machine learning to determine whether viewers should be on a teen account. The company said it plans to start using this AI application on a subset of US users in the coming weeks for a trial before rolling it out to the rest of the market. The tool will assess user behaviors including the types of videos being searched for, the categories of videos watched and how long the account has existed. When an account is deemed by machine learning to belong to a teen, YouTube wi

Russian airline Aeroflot grounds dozens of flights after cyberattack

Aeroflot, Russia's flag carrier, has suffered a cyberattack that resulted in the cancellation of more than 60 flights and severe delays on additional flights. Although official sources from Russia, like the General Prosecutor's Office, did not attribute the attack to specific threat groups or even origin, responsibility was taken by Ukrainian and Belarusian hacktivist collectives 'Silent Crow' and 'Cyberpartisans BY.' The latter are known for previous attacks on the Belarusian Railway, the cou

Google Workspace is rolling out a security update to stop token stealing attacks

is a news writer who covers the streaming wars, consumer tech, crypto, social media, and much more. Previously, she was a writer and editor at MUO. Google Workspace is launching a new security measure to help prevent the same type of account takeover attack that impacted Linus Tech Tips. The feature, which is rolling out in beta for Chrome users on Windows, is designed to block bad actors from remotely stealing the cookies that keep you logged into your Workspace account. Google calls the feat

How attackers are still phishing "phishing-resistant" authentication

As awareness grows around many MFA methods being “phishable” (i.e. not phishing resistant), passwordless, FIDO2-based authentication methods (aka. passkeys) like YubiKeys, Okta FastPass, and Windows Hello are being increasingly advocated. This is a good thing. The most commonly used MFA factors (like SMS codes, push notifications, and app-based OTP) are routinely bypassed, with modern reverse-proxy “Attacker-in-the-Middle” phishing kits the most common method (and the standard choice for phishi

You won't regret buying these two Moft MagSafe accessories for your iPhone - here's why

The Moft Tripod accessory. Kayla Solino/ZDNET Everyone loves affordable upgrades. And MagSafe accessories are the easiest way to elevate your phone's design and function. At ZDNET, I test dozens of MagSafe accessories, from battery packs to wallets, phone cases, tripods, and more. And as a mobile accessory expert, there are genuinely a few that I reach for nearly every day that stand out from the mountains of MagSafe gear I've tried. The Moft MagSafe Tripod and the Moft MagSafe wallet are two

Mysterious Petroglyphs Reemerge on Oahu Beach

Shifting sands have once again revealed mysterious petroglyphs on the shores of a remote group of islands. The carvings appear and disappear depending on the water current, sometimes remaining hidden for years at a time before returning like a divine omen. But they’re not (as far as we know) an auspice, and this isn’t a fantasy movie. The petroglyphs are carved in sandstone along a beach on Oahu’s west coast, in front of a U.S. Army recreation center, and could be over 1,000 years old, as first

Software Development at 800 Words per Minute

Software Development at 800 Words Per Minute Jul 24, 2025, 12:19 AM (updated Jul 28, 2025, 10:18 PM ) Imagine reading code not by looking at the screen, but by listening to interface elements, variables, language constructs and operators read at 800 words per minute (WPM) - over 5 times faster than normal speech. It sounds like gibberish to most, but to me, it’s as natural as you reading this sentence. If you’ve ever wondered how someone codes without seeing the screen, or if you’re curious a

Wi-Fi 8 detailed, even if it's years away: More stable connections, lower latency

Serving tech enthusiasts for over 25 years.TechSpot means tech analysis and advice you can trust Forward-looking: The latest devices are only now starting to support Wi-Fi 7, and so Wi-Fi 8 remains several years away, but members of the group that defines Wi-Fi standards are already previewing what comes next. Wi-Fi 8 is designed to deliver more reliable connections, particularly in crowded and high-traffic public environments. A blog post from Qualcomm details several new technologies the com

Scattered Spider is running a VMware ESXi hacking spree

Scattered Spider hackers have been aggressively targeting virtualized environments by attacking VMware ESXi hypervisors at U.S. companies in the retail, airline, transportation, and insurance sectors. According to the Google Threat Intelligence Group (GITG), the attackers keep employing their usual tactics that do not include vulnerability exploits but rely on perfectly executed social engineering "to bypass even mature security programs." A Scattered Spider attack The researchers say that th

Solid protocol restores digital agency

How Solid Protocol Restores Digital Agency The current state of digital identity is a mess. Your personal information is scattered across hundreds of locations: social media companies, IoT companies, government agencies, websites you have accounts on, and data brokers you’ve never heard of. These entities collect, store, and trade your data, often without your knowledge or consent. It’s both redundant and inconsistent. You have hundreds, maybe thousands, of fragmented digital profiles that ofte

Apple @ Work: Apple makes Managed Apple Account transitions easier for IT at scale

Apple @ Work is exclusively brought to you by Mosyle, the only Apple Unified Platform. Mosyle is the only solution that integrates in a single professional-grade platform all the solutions necessary to seamlessly and automatically deploy, manage & protect Apple devices at work. Over 45,000 organizations trust Mosyle to make millions of Apple devices work-ready with no effort and at an affordable cost. Request your EXTENDED TRIAL today and understand why Mosyle is everything you need to work with

Meta Debuts More Instagram Protections for Teen Users. Here's What's New

Meta this week unveiled the latest efforts it's making to bolster the safety of teens and kids on its social media apps, with a particular focus on the teen-skewing Instagram. The company has touted these new features for Instagram in a blog post, most notably adding more information and warnings about accounts that teens might try to contact via direct messages. "We've added new safety features to DMs in Teen Accounts to give teens more context about the accounts they're messaging and help the