Latest Tech News

Stay updated with the latest in technology, AI, cybersecurity, and more

Filtered by: acc Clear Filter

Do not download the app, use the website

The 2010s was the Wild West of the mobile world. "Mobile-first" was the buzzword, much like "AI-first" is today. Every company, from the biggest social media giants to your local pizza parlor, seemed to be pestering you to download their app. There was a genuine hype train, and everyone was on board. The apps, frankly, were always mediocre, and a far cry from the full functionality of their website counterparts. But the message was clear. If you weren't on mobile, you were falling behind. Fast

Microsoft investigates outage affecting Microsoft 365 admin center

Microsoft is investigating an ongoing outage blocking Microsoft 365 administrators with business or enterprise subscriptions from accessing the admin center. While the company has yet to disclose which regions are currently affected by this ongoing service degradation issue, it's currently tracking it on its official service health status page to provide impacted organizations with access to up-to-date information. "Microsoft is investigating a potential issue that may be preventing administra

ICE Plans to Track Over 180,000 Immigrants With Ankle Monitors: Report

ICE plans to expand its use of electronic surveillance of immigrants from about 24,000 people currently fitted with GPS ankle monitors to about 183,000 people, according to a report from the Washington Post. The move will continue to shovel money to the private prison industry, which has been making money hand over fist since President Donald Trump was inaugurated for a second time in January. ICE released an internal memo on June 9 about the so-called Alternatives to Detention program, which a

No, Instagram didn’t suspend Zohran Mamdani’s account for being ‘too socialist’

is features writer with five years of experience covering the companies that shape technology and the people who use their tools. In a story published earlier this week, a site called “NYC Journals” claimed to have a bombshell: that Instagram had suspended the account of New York mayoral candidate Zohran Mamdani for being “too socialist.” The story claimed that Mamdani’s account was down for three hours; it also cited a “leaked memo” from inside Instagram that said his content went against US

Don’t get your hopes up for One UI 9 leaks as Samsung fixes this major loophole

Mishaal Rahman / Android Authority TL;DR Samsung has patched a loophole that enabled many recent One UI leaks. The exploit allowed users to access internal OTA builds via a custom tool and decrypt metadata. You almost certainly won’t be treated to as many One UI 9 leaks going forward. The Samsung fans among you enjoy delving into One UI leaks, and we enjoy bringing them to you when they surface. The bad news for all of us is that it looks like the party might be over. According to a report

RFK Jr.’s anti-vaccine group sues him: “This is not the Bobby we know”

A lawyer who represents Children's Health Defense—the rabid anti-vaccine organization founded by the equally fervent anti-vaccine advocate and current US health secretary, Robert F. Kennedy Jr.—has filed a lawsuit against Kennedy, alleging that he has failed to set up a task force to promote safer childhood vaccinations. The task force's creation is outlined in the National Childhood Vaccine Injury Act of 1986, which is mainly known for setting up the National Vaccine Injury Compensation Progra

A Premium Luggage Service’s Web Bugs Exposed the Travel Plans of Every User—Including Diplomats

An airline leaving all of its passengers’ travel records vulnerable to hackers would make an attractive target for espionage. Less obvious, but perhaps even more useful for those spies, would be access to a premium travel service that spans 10 different airlines, left its own detailed flight information accessible to data thieves, and seems to be favored by international diplomats. That's what one team of cybersecurity researchers found in the form of Airportr, a UK-based luggage service that p

Mitel warns of critical MiVoice MX-ONE authentication bypass flaw

Mitel Networks has released security updates to patch a critical-severity authentication bypass vulnerability impacting its MiVoice MX-ONE enterprise communications platform. MX-ONE is the company's SIP-based communications system, which can scale to support hundreds of thousands of users. The critical security flaw is due to an improper access control weakness discovered in the MiVoice MX-ONE Provisioning Manager component and has yet to be assigned a CVE ID. Unauthenticated attackers can exp

Use Your Type System

Today I'm discussing a trivially simple technique that I've rarely seen used in production codebases. In programming, we often need to deal with simple values that can be represented by simple, generic types built into our programming language or provided by libraries: types like integer, string, or UUID. In any nontrivial codebase, this inevitably leads to bugs when, for example, a string representing a user ID gets used as an account ID, or when a critical function accepts three integer argu

Shattering the rotation illusion: The attacker view and AWSKeyLockdown (2024)

PDF Report Shattering the Rotation Illusion: How Quickly Leaked AWS Keys are Exploited Download Now -> Through the Attacker’s Eyes: A New Era of NHI Security This final installment in our blog series brings together everything we’ve uncovered about leaked AWS Access Keys—how attackers exploit them, why traditional security measures fall short, and what organizations can do to protect themselves. Over the series, we explored real-world scenarios across various platforms: GitHub and GitLab, Pac

VectorDB bench now support S3Vector

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community. By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails. Already on GitHub? Sign in to your account

Shattering the Rotation Illusion: The Attacker View & AWSKeyLockdown

PDF Report Shattering the Rotation Illusion: How Quickly Leaked AWS Keys are Exploited Download Now -> Through the Attacker’s Eyes: A New Era of NHI Security This final installment in our blog series brings together everything we’ve uncovered about leaked AWS Access Keys—how attackers exploit them, why traditional security measures fall short, and what organizations can do to protect themselves. Over the series, we explored real-world scenarios across various platforms: GitHub and GitLab, Pac

Bracing for a Recession? These Accounts Can Keep Your Money Safe

The best place for your cash depends on what you're using it for. PM Images/Getty Images A recession may not be as likely as it seemed earlier this year, at least according to some forecasts. But economic uncertainty is still forcing us to be cautious about our finances. From high prices to layoffs, the big financial struggles are out of our control. However, one thing we can do to help ourselves weather the ups and downs is to make sure our money is in the right place. Keeping your cash safe

IBM shares drop despite earnings beat

IBM CEO Arvind Krishna appears at the World Economic Forum in Davos, Switzerland, on Jan. 16, 2024. IBM shares fell as much as 5% in extended trading on Wednesday after the tech conglomerate issued second-quarter results that topped Wall Street projections. Here's how the company did in comparison with LSEG consensus: Earnings per share: $2.80 adjusted vs. $2.64 expected $2.80 adjusted vs. $2.64 expected Revenue: $16.98 billion vs. $16.59 billion IBM's revenue increased nearly 8% year over

Meta Touts Even More Protections for Teen Users. Here's What's New

Meta on Wednesday unveiled the latest efforts it's making to bolster the safety of teens and kids on its social media apps. The company has touted these new features for Instagram and Facebook in a blog post, most notably adding more information and warnings about accounts teens might try to contact via direct messages. "We've added new safety features to DMs in Teen Accounts to give teens more context about the accounts they're messaging and help them spot potential scammers," the post explain

Proton launches privacy-respecting encrypted AI assistant Lumo

Proton has launched a new tool called Lumo, offering a privacy-first AI assistant that does not log user conversations and doesn't use their prompts for training. Proton is a Swiss company behind proven privacy and security tools and services, including Proton Mail, Proton VPN, and Proton Drive. In June 2024, it transitioned to a non-profit structure, putting user privacy over profits. The introduction of Lumo aligns with this mission, as Proton claims this AI tool is designed to provide help

FastVLM: Efficient Vision Encoding for Vision Language Models

Vision Language Models (VLMs) enable visual understanding alongside textual inputs. They are typically built by passing visual tokens from a pretrained vision encoder to a pretrained Large Language Model (LLM) through a projection layer. By leveraging the rich visual representations of the vision encoder and the world knowledge and reasoning capabilities of the LLM, VLMs can be useful for a wide range of applications, including accessibility assistants, UI navigation, robotics, and gaming. VLM

4 things Proton's privacy-first AI chatbot Lumo can do - and how to try it

Elyse Betters Picaro / ZDNET Proton, the company responsible for Proton Mail, Proton VPN, and more services, is planning to launch a new AI chatbot called Lumo that aims to preserve your privacy. This new chatbot can do things like summarize documents, create code, and just about anything the other chatbots can do. 1. Stores data locally The difference between Lumo and other chatbots is that Lumo stores all data locally, so you don't have to worry that the company has access to your data. Pro

How to harden your Active Directory against Kerberoasting

Kerberoasting is a common attack targeting Microsoft Active Directory, enabling attackers to compromise service accounts with low risk of detection. Because it manipulates legitimate accounts, it can be highly effective. However, robust password security can keep the criminals at bay. First, what is Kerberoasting? The name comes from ‘Kerberos’, the authentication protocol used in Active Directory, which verifies a user’s identity or that of a computer requesting access to resources. Kerberoas

How to set up and use passkeys across your iPhone, iPad, and Mac

Lance Whitney / Elyse Betters Picaro / ZDNET Passkeys offer a more secure and convenient method of authentication compared with passwords. But they can be challenging to set up and synchronize, especially if you want to use the same ones on a range of devices, such as a mobile phone, tablet, and computer. As one solution, Apple users can save and sync their passkeys across an iPhone, iPad, and Mac. The key here is iCloud Keychain, which can store passkeys as well as passwords. You first set up

Meta updates safety features for teens. More than 600,000 accounts linked to predatory behavior

Facebook and Instagram icons are seen displayed on an iPhone. Meta on Wednesday introduced new safety features for teen users, including enhanced direct messaging protections to prevent "exploitative content." Teens will now see more information about who they're chatting with, like when the Instagram account was created and other safety tips, to spot potential scammers. Teens will also be able to block and report accounts in a single action. "In June alone, they blocked accounts 1 million ti

Meta is adding new safety features to child-focused Instagram accounts run by adults

Meta is adding some of its teen safety features to Instagram accounts featuring children, even if they're ran by adults. While children under 13 years of age aren't allowed to sign up on the social media app, Meta allows adults like parents and managers to run accounts for children and post videos and photos of them. The company says that these accounts are "overwhelmingly used in benign ways," but they're also targeted by predators who leave sexual comments and ask for sexual images in DMs. In

Instagram adds new protections for accounts that primarily feature children

Meta is introducing additional safeguards for Instagram accounts run by adults that primarily feature children, the company announced on Wednesday. These accounts will automatically be placed into the app’s strictest message settings to prevent unwanted messages, and will have the platform’s “Hidden Words” feature enabled to filter offensive comments. The company is also rolling out new safety features for teen accounts. Accounts that will be placed into the new, stricter message settings inclu

Toy company may regret coming for “Sylvanian Drama” TikToker, experts say

A popular account on TikTok and Instagram stopped posting suddenly at the end of last year, hit by a lawsuit after garnering millions of views on funny videos using adorable Calico Critter dolls made for preschoolers to act out dark, cringe-y adult storylines. While millions of followers mourn the so-called "Sylvanian Drama" account's demise, experts told Ars that the creator may have a decent chance at beating the lawsuit. The "Sylvanian Drama" account derived its name from "Sylvanian Familie

CISA and FBI warn of escalating Interlock ransomware attacks

CISA and the FBI warned on Tuesday of increased Interlock ransomware activity targeting businesses and critical infrastructure organizations in double extortion attacks. Today's advisory was jointly authored with the Department of Health and Human Services (HHS) and the Multi-State Information Sharing and Analysis Center (MS-ISAC) and it provides network defenders with indicators of compromise (IOCs) collected during investigations of incidents as recent as June 2025, along with mitigation meas

Any-LLM: A unified API to access any LLM provider

When it comes to using LLMs, it’s not always a question of which model to use: it’s also a matter of choosing who provides the LLM and where it is deployed. Today, we announce the release of any-llm, a Python library that provides a simple unified interface to access the most popular providers. When it comes to using Large Language Models (LLMs), it’s not always a question of which model to use: it’s also a matter of choosing who provides the LLM and where it is deployed. As we’ve written about

Google Chrome for iOS now lets you switch between personal and work accounts

Google The BYOD trend has been a popular way for people to use their own devices at work. But the practice often blurs the line between personal and professional, triggering security risks and other issues. Now, Google has expanded a feature designed to ease and improve the process. On Monday, Google announced that Chrome users on iOS will now be able to switch between their work and personal accounts directly in the browser. This capability has already been available for Chrome desktop and An

Tailscale says Zero Trust is broken, and that might be a good thing

Zero Trust has been a buzzword at every enterprise tech conference for years (only recently being replaced with AI), but Tailscale’s new State of Zero Trust 2025 report makes it clear that most organizations still have no idea what it means or how to do it. They surveyed 1,000 IT, security, and engineering leaders. Only 1% of those surveyed said they’re happy with their current access setup. That stat says a lot about the confusion in the marketplace. Some of my favorite gear eufyCam 2C Upgrade

We have made the decision to not continue paying for BBB accreditation

We have made the conscious choice not to continue paying for accreditation from the Better Business Bureau (BBB). We realize that this may raise questions among our customers, and we want to explain why we made this decision. For years, people have been told to look for BBB accredited businesses, and that it somehow reflects whether a business is on the up and up. What most don’t realize is that businesses PAY to be accredited with the BBB. You do not EARN an accreditation- you buy it. A few m