Latest Tech News

Stay updated with the latest in technology, AI, cybersecurity, and more

Filtered by: ty Clear Filter

Here’s how Android Identity Check will start taking advantage of your smartwatch (APK teardown)

Joe Maring / Android Authority TL;DR Identity Check offers an extra layer of protection when someone steals both your phone and your PIN. By requiring biometrics, Identity Check attempts to limit the harm bad actors could do. Google is working to let you bypass that biometric requirement when your device is connected to a trusted smartwatch. We all want our devices to be secure, but practical considerations mean we’re often striking a balance between security and convenience. That’s not a ba

Rollercoaster Tycoon (Or, MicroProse's Last Hurrah)

I think it touches on two of the most fundamental aspects of human nature. We all like doing something constructive, where we can see that we are creating something from virtually nothing, and we all have a desire to nurture or look after things. This is what the game is all about. You spend hours painstakingly building your park and roller coasters up piece by piece, and then it becomes your own baby, which you want to look after and keep running smoothly, watching it grow in popularity and del

Supporting the BEAM community with free CI/CD security audits

Keep up to date with the latest news, best practice ideas and exclusive offers. Don’t miss out. Sign up here. Sign up for our quarterly newsletter At Erlang Solutions, our support for the BEAM community is long-standing and built into everything we do. From contributing to open-source tools and sponsoring events to improving security and shaping ecosystem standards, we’re proud to play an active role in helping the BEAM ecosystem grow and thrive. One way we’re putting that support into action

AI-powered Cursor IDE vulnerable to prompt-injection attacks

A vulnerability that researchers call CurXecute is present in almost all versions of the AI-powered code editor Cursor, and can be exploited to execute remote code with developer privileges. The security issue is now identified as CVE-2025-54135 and can be leveraged by feeding the AI agent a malicious prompt to trigger attacker-control commands. The Cursor integrated development environment (IDE) relies on AI agents to help developers code faster and more efficiently, allowing them to connect

Online Safety Act: What went wrong?

The Online Safety Act recently rolled out in the UK and you’ll be very happy to hear it’s a raging dumpster fire. But this newsletter isn’t about that per se. Instead, in this poorly-considered mire, there’s a kernel of truth, a little glowing nugget that reveals what’s wrong with much technology regulation. Before we get to this little-discussed point, let’s cut up some context into bite-sized chunks and have a good old gobble. So, the Online Safety Act 2023. Theoretically it’s a Pretty Good

TikTok launches ‘TikTok Pro’ in Europe with built-in charity program

In Brief TikTok is launching a new version of its app called “TikTok Pro” in Germany, Portugal, and Spain. The app features TikTok’s new “Sunshine Programme,” which allows users to support charitable organizations. Users can earn ‘virtual sunshine’ by inviting others to join and by interacting with charity-related content, such as liking or reposting videos, following charity accounts, or searching for charitable causes. They can then use this virtual sunshine on a charity, after which TikTok

Why I'm recommending this midrange Lenovo tablet over competing models

Lenovo Yoga Tab Plus ZDNET's key takeaways The Lenovo Yoga Tab Plus is on sale right now for $549. It's a slam dunk tablet with a brilliant display, great speakers, and comes with a keyboard, case, and stylus. In laptop mode, it's better for simpler tasks. View now at Walmart Lenovo's Yoga Tab Plus is a well-rounded 13-inch tablet that comes with a keyboard, case, and stylus, offering all the primary use cases you can ask for from a tablet straight out of the box. It features a 12.7-inch, 3K

The Untold Impact of Cancellation

Warning: towards the end of this post are references to suicide, which may be distressing to some readers. Discretion is advised. The Untold Impact of Cancellation I have never before been open about the impact that being cancelled had upon me. Cancellations try to silence their targets, so their stories are less often heard. This is my account. As you read about my experience over the last four years, you may come to understand why I have found it so hard to share. This is my own unique sto

AI Won’t Boost Human Productivity Yet, U.S. Federal Reserve Says

Generative AI is not just another tech hype cycle that is bound to die down but is instead a game-changer for human productivity, according to the Federal Reserve. The big caveat, though, is the road to get there will be “inherently slow” and “fraught with risk.” In a recent paper published by the Fed Board of Governors, researchers suggest that the hype around generative AI is probably not a bubble in the long run and that the technology will be a serious macroeconomic force, proving to have r

AC or DC: Which Is Better?

As the story goes, the rock band AC/DC took its name from a label on an old sewing machine in the Young brothers’ home. It must have meant that the machine could run on either alternating-current or direct-current electricity. Today, all the newfangled electronic devices in our homes run only on DC power—even lighting fixtures, now that LEDs have replaced incandescent bulbs. But wait. The electricity that comes out of your wall socket is alternating current. That means each device needs to conv

AI Won’t Boost Human Productivity Just Yet, a New Paper From the Federal Reserve Says

Generative AI is not just another tech hype cycle that is bound to die down but is instead a game-changer for human productivity, according to the Federal Reserve. The big caveat, though, is the road to get there will be “inherently slow” and “fraught with risk.” In a recent paper published by the Fed Board of Governors, researchers suggest that the hype around generative AI is probably not a bubble in the long run and that the technology will be a serious macroeconomic force, proving to have r

I replaced my ThinkPad with this Lenovo tablet for a week - and it was pretty dang close

Lenovo Yoga Tab Plus ZDNET's key takeaways The Lenovo Yoga Tab Plus is on sale right now for $549. It's a slam dunk tablet with a brilliant display, great speakers, and comes with a keyboard, case, and stylus. In laptop mode, it's better for simpler tasks. $599.99 at Best Buy $522.49 at Lenovo more buying choices Lenovo's Yoga Tab Plus is a well-rounded 13-inch tablet that comes with a keyboard, case, and stylus, offering all the primary use cases you can ask for from a tablet straight out of

Replacing cron jobs with a centralized task scheduler

At Heartbeat, we have a lot of different tasks that need to run at a particular time. Users can create draft posts or events that get published at a certain time. Event reminders need to be sent at a certain number of hours before an event. Automated workflows can be set up that send emails or direct messages after a delay. For the longest time, all of these tasks were managed by a variety of cron scripts. We had createScheduledPosts.ts that would run every 15 minutes, scan our table of schedul

Understanding the Complete Identity Management Ecosystem

Confused by the growing identity management landscape? This comprehensive guide breaks down every IAM category—from traditional workforce identity to emerging AI agents. Learn how CIAM, PAM, Zero Trust, and 15+ other solutions connect in the modern security ecosystem. 🔐 Identity management has grown from simple password systems into a complex web of specialized tools and technologies. Each piece serves a specific purpose, but understanding how they all fit together can be confusing. This guide

Amazon DocumentDB Serverless database looks to accelerate agentic AI, cut costs

Want smarter insights in your inbox? Sign up for our weekly newsletters to get only what matters to enterprise AI, data, and security leaders. Subscribe Now The database industry has undergone a quiet revolution over the past decade. Traditional databases required administrators to provision fixed capacity, including both compute and storage resources. Even in the cloud, with database-as-a-service options, organizations were essentially paying for server capacity that sits idle most of the tim

Microsoft Predicts These Jobs Are Safe From AI

Much ink has already been spilled about the threat of AI to various labor markets. As new forms of automation seep into industries, folks want to know which jobs are endangered and which are safe. Well, a new study published by Microsoft researchers purports to show which positions have the most AI “applicability,” and which do not. From the research, you might assume you could predict which careers have longevity and which may soon go the way of the Dodo—although the report itself denies that t

Microsoft to disable Excel workbook links to blocked file types

Microsoft has announced that it will start disabling external workbook links to blocked file types by default between October 2025 and July 2026. After the rollout, Excel workbooks referencing blocked file types will display a #BLOCKED error or fail to refresh, eliminating security risks associated with accessing unsupported or high-risk file types, including, but not limited to, phishing attacks that utilize workbooks to redirect targets to malicious payloads. This change is being introduced

Show HN: The easiest accessibility (a11y) checker for VSCode

Be-a11y VSCode Extension A Visual Studio Code extension for running accessibility audits using be-a11y. This extension allows you to analyze your project or a remote website for accessibility issues directly from VSCode. Results are presented in a convenient way and can be saved for further review. Features Run accessibility audits on the current workspace (local project) or any URL View results directly in VSCode Save the latest accessibility report to a file All actions available in the

Read This Before You Trust Any AI-Written Code

We are in the era of vibe coding, allowing artificial intelligence models to generate code based on a developer’s prompt. Unfortunately, under the hood, the vibes are bad. According to a recent report published by data security firm Veracode, about half of all AI-generated code contains security flaws. Veracode tasked over 100 different large language models with completing 80 separate coding tasks, from using different coding languages to building different types of applications. Per the repor

Microsoft now pays up to $40,000 for some .NET vulnerabilities

Microsoft has expanded its .NET bug bounty program and increased rewards to $40,000 for some .NET and ASP.NET Core vulnerabilities. Madeline Eckert, a senior program manager for Researcher Incentives and Bounty at Microsoft, stated that these changes aim to more accurately reflect the complexity involved in discovering and exploiting .NET vulnerabilities. "We're excited to announce significant updates to the Microsoft .NET Bounty Program. These changes expand the program's scope, simplify the

Why I recommend this Lenovo tablet over competing Google and Samsung models

Lenovo Yoga Tab Plus ZDNET's key takeaways The Lenovo Yoga Tab Plus is on sale right now for $549. It's a slam dunk tablet with a brilliant display, great speakers, and comes with a keyboard, case, and stylus. In laptop mode, it's better for simpler tasks. $599.99 at Best Buy $522.49 at Lenovo more buying choices Lenovo's Yoga Tab Plus is a well-rounded 13-inch tablet that comes with a keyboard, case, and stylus, offering all the primary use cases you can ask for from a tablet straight out of

Show HN: Astro dev blog template with 60 interactive colorschemes

Welcome to the example site. This site is meant to show off my custom Astro theme/template MultiTerm which creates a coder-ready blog complete with an interactive theme changer, RSS, sitemap, tagging, and markdown extensions. Tags Latest Posts # Showing Off Blog Features 2025-07-20 3 min read Since the post does not have a description in the frontmatter, the first paragraph is used. #astro Read # TypeScript's keyof and Mapped Types 2025-07-14 1 min read Explore the keyof operator and mapped

CISA open-sources Thorium platform for malware, forensic analysis

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) today announced the public availability of Thorium, an open-source platform for malware and forensic analysts across the government, public, and private sectors. Thorium was developed in partnership with Sandia National Laboratories as a scalable cybersecurity suite that automates many tasks involved in cyberattack investigations, and can schedule over 1,700 jobs per second and ingest over 10 million files per hour per permission

Launch HN: Gecko Security (YC F24) – AI That Finds Vulnerabilities in Code

Hey HN, I'm JJ, Co-Founder of Gecko Security ( https://www.gecko.security ). We're building a new kind of static analysis tool that uses LLMs to find complex business logic and multi-step vulnerabilities that current scanners miss. We’ve used it to find 30+ CVEs in projects like Ollama, Gradio, and Ragflow ( https://www.gecko.security/research ). You can try it yourself on any OSS repo at ( https://app.gecko.security ). Anyone who’s used SAST (Static Application Security Testing) tools knows th

TikTok merges its Core Product and Trust & Safety teams

As TikTok’s future in the U.S. remains uncertain, the company is merging its Core Product and Trust & Safety teams into a single organization, according to an internal memo sent to staff by TikTok CEO Shou Zi Chew and viewed by TechCrunch and confirmed by TikTok. “This new team will allow us to better leverage our technical capabilities across both business and safety objectives, and will help us move faster as we develop the next generation of safety technology,” Chew wrote in the memo. As pa

Spikes in malicious activity precede new security flaws in 80% of cases

Researchers have found that in roughly 80% of cases, spikes in malicious activity like network reconnaissance, targeted scanning, and brute-forcing attempts targeting edge networking devices are a precursor to the disclosure of new security vulnerabilities (CVEs) within six weeks. This has been discovered by threat monitoring firm GreyNoise, which reports these occurrences are not random, but are rather characterized by repeatable and statistically significant patterns. GreyNoise bases this on

Inside the Summit Where China Pitched Its AI Agenda to the World

Three days after the Trump administration published its much-anticipated AI action plan, the Chinese government put out its own AI policy blueprint. Was the timing a coincidence? I doubt it. China’s “Global AI Governance Action Plan” was released on July 26, the first day of the World Artificial Intelligence Conference (WAIC), the largest annual AI event in China. Geoffrey Hinton and Eric Schmidt were among the many Western tech industry figures who attended the festivities in Shanghai. Our WIR

TikTok gets long-overdue fact-checking enhancement, plus new parental controls

Video streaming platform TikTok is finally introducing community fact-checking, in the form of TikTok Footnotes – the equivalent to X’s Community Notes. This is initially available in the US only. The company has also announced new parental controls, aimed at giving oversight of both TikTok consumption and uploads by teens … Community Notes have played a valuable role on the social network formerly known as Twitter. Hoaxes and disinformation has been a growing problem on X, and the Community N

Spikes in malicious activity precede new CVEs in 80% of cases

Researchers have found that in roughly 80% of cases, spikes in malicious activity like network reconnaissance, targeted scanning, and brute-forcing attempts targeting edge networking devices are a precursor to the disclosure of new security vulnerabilities (CVEs) within six weeks. This has been discovered by threat monitoring firm GreyNoise, which reports these occurrences are not random, but are rather characterized by repeatable and statistically significant patterns. GreyNoise bases this on

Two critical Android 16 security features you're not using (but absolutely should)

JEFF PACHOUD/Getty Images Although Google's earlier-than-expected release of Android 16 was missing a few important features, the updated OS does deliver improved security that every Android user would be well-advised to enable. I'll explain these two key security features and how to find and enable them. Also: How to clear your Android phone cache (and why it greatly improves performance) 1. Identity Check This feature was added in 2024, but it didn't receive much attention until the relea