Latest Tech News

Stay updated with the latest in technology, AI, cybersecurity, and more

Filtered by: cur Clear Filter

I Asked Crime Experts When Home Break-Ins Usually Happen and the Answers Stunned Me

Modern home security cameras and smart systems are well-equipped to watch over our homes -- I should know, I've spent years testing more models than I can count. The biggest advantage is that they can watch your home when you're not there, like on a summer vacation or asleep at night. But when is your home the most vulnerable? I took a look. It turns out that burglars tend to break into houses or look for vulnerabilities at a few specific times. Knowing when can help you stay safer and pick the

The best password managers for Android of 2025: Expert tested

Bitwarden consistently features as one of my top password manager recommendations across numerous platforms, and Android is no different. Why we like it: With Bitwarden, you can sync unlimited credentials across as many devices as you want for free, so it's easy to access your logins, credit cards, identities, and notes wherever you need them. Saving and autofilling work well in mobile apps and browsers via biometric unlock with your fingerprint or face. Review: Bitwarden Bitwarden is open so

Amazon AI coding agent hacked to inject data wiping commands

A hacker planted data wiping code in a version of Amazon's generative AI-powered assistant, the Q Developer Extension for Visual Studio Code. Amazon Q is a free extension that uses generative AI to help developers code, debug, create documentation, and set up custom configurations. It is available on Microsoft’s Visual Code Studio (VCS) marketplace, where it counts nearly one million installs. As reported by 404 Media, on July 13, a hacker using the alias ‘lkmanka58’ added unapproved code on

‘Rick and Morty’ Is Getting a Presidential Spin-Off

As Rick and Morty continues to roll out its excellent eighth season, fans now have even more to look forward to than Rick and Morty seasons nine, 10, 11, and 12. President Curtis, a spin-off featuring one of the show’s recurring supporting characters, is officially a go at Adult Swim. And yes, the legendary Keith David will be back voicing the POTUS. The President’s clashes with Rick go all the way back to the season two episode “Get Schwifty”—and he’s popped up several times since then, usuall

Animated Cursors

Tattoy now supports animated cursors. It uses the same format as Ghostty, therefore rendering the cursor using custom shaders. Here are some popular Ghostty cursors, that you can use out-of-the-box with Tattoy. Even though Tattoy supports Ghostty cursors its rendering is quite different. Ghostty renders the cursor using actual pixels whereas Tattoy renders using UTF8 text-based "pixels", namely "▀" and "▄". This means that Tattoy cursors sometimes miss out on the subtleties of Ghostty cursors,

Tea App Breach Exposes 72,000 Selfies, ID Photos and Other User Images

Tea, a women's safety dating app that surged to the top of the free iOS App Store listings this week, has been the subject of a major security breach. The company confirmed Friday that it has "identified authorized access to one of our systems" that exposed thousands of user images. According to Tea's preliminary findings, the breach allowed access to approximately 72,000 images, broken down into two groups: 13,000 images of selfies and photo identification that people had submitted during acco

Tea App Users' Faces and IDs Reportedly Posted to 4chan in Security Breach

Tea, a women's safety dating app that surged to the top of the free iOS App Store listings this week, has been the subject of a major security breach. The company confirmed Friday that it has "identified authorized access to one of our systems" that exposed thousands of user images. According to Tea's preliminary findings, the breach allowed access to approximately 72,000 images, broken down into two groups: 13,000 images of selfies and photo identification that people had submitted during acco

Tea App Users' Faces and IDs Reportedly Posted to 4chan in Security Breach

Tea, a women's safety dating app that surged to the top of the free iOS App Store listings this week, has been the subject of a major security breach. The company confirmed Friday that it has "identified authorized access to one of our systems" that exposed thousands of user images. According to Tea's preliminary findings, the breach allowed access to approximately 72,000 images, broken down into two groups: 13,000 images of selfies and photo identification that people had submitted during acco

Show HN: A macOS clock that stays visible when coding or binging in fullscreen

Very nice I'm a minimalist by nature and typically keep both my menu bar and Dock hidden. That said, I still like having the clock visible at all times. I've tried various widgets in the past to solve this, but none really did the trick—until now. This app nails it. I can still see the clock and date exactly where I want them, and when I move the cursor to the menu bar, the app tucks neatly underneath, just as it should. The customization options are also thoughtfully designed. Bravo!

Topics: app bar clock cursor menu

Startup Claims Its Fusion Reactor Concept Can Turn Cheap Mercury Into Gold

Keep checking those gold prices—scientists have more news about the coveted metal. An energy startup claims it has the recipe for modern-day alchemy: turning mercury into gold inside a nuclear fusion reactor. Last week, Marathon Fusion, a San Francisco-based energy startup, submitted a preprint detailing an action plan for synthesizing gold particles via nuclear transmutation—essentially the process of turning one element into another by tweaking its nucleus. The paper, which has yet to undergo

The POSIX specification of vi

Certain terminals do not have all the capabilities necessary to support the complete vi definition. When these commands cannot be supported on such terminals, this condition shall not produce an error message such as "not an editor command" or report a syntax error. The implementation may either accept the commands and produce results on the screen that are the result of an unsuccessful attempt to meet the requirements of this volume of POSIX.1-2024 or report an error describing the terminal-rel

Microsoft: SharePoint flaws exploited in Warlock ransomware attacks

A China-based hacking group is deploying Warlock ransomware on Microsoft SharePoint servers vulnerable to widespread attacks targeting the recently patched ToolShell zero-day exploit chain. Non-profit security organization Shadowserver is currently tracking over 420 SharePoint servers that are exposed online and remain vulnerable to these ongoing attacks. "Although Microsoft has observed this threat actor deploying Warlock and Lockbit ransomware in the past, Microsoft is currently unable to co

OpenAI prepares to launch GPT-5 in August

is a senior editor and author of Notepad , who has been covering all things Microsoft, PC, and tech for over 20 years. Earlier this year, I heard that Microsoft engineers were preparing server capacity for OpenAI’s next-generation GPT-5 model, arriving as soon as late May. After some additional testing and delays, sources familiar with OpenAI’s plans tell me that GPT-5 is now expected to launch as early as next month. OpenAI CEO Sam Altman recently revealed on X that “we are releasing GPT-5 so

Some VMware perpetual license owners are unable to download security patches

Some VMware perpetual license holders are currently unable to download security patches, The Register reported today. The virtualization company has only said that these users will receive the patches at “a later date,” meaning users are uncertain how long their virtualization environments will be at risk. Since Broadcom bought VMware and ended perpetual license sales in favor of bundled subscription-based SKUs, some organizations have opted against signing up for a subscription and are running

Microsoft fixes SharePoint zero-day exploits used in cyberattacks and ransomware - how to patch them

Kiryl Pro motion / Getty Images Microsoft has patched three critical zero-day SharePoint security flaws that hackers have already exploited to attack more vulnerable organizations. Responding to the exploits, the software giant initially issued fixes just for SharePoint Server Subscription Edition and SharePoint Server 2019, and then eventually rolled out a patch for SharePoint Server 2016 as well. Designated as CVE‑2025‑53771 and CVE‑2025‑53770, the two vulnerabilities apply only to on‑premis

OpenAI prepares to launch GPT-5 in August

is a senior editor and author of Notepad , who has been covering all things Microsoft, PC, and tech for over 20 years. Earlier this year, I heard that Microsoft engineers were preparing server capacity for OpenAI’s next-generation GPT-5 model, arriving as soon as late May. After some additional testing and delays, sources familiar with OpenAI’s plans tell me that GPT-5 is now expected to launch as early as next month. OpenAI CEO Sam Altman recently revealed on X that “we are releasing GPT-5 so

Microsoft: SharePoint servers also targeted in ransomware attacks

A China-based hacking group is deploying Warlock ransomware on Microsoft SharePoint servers vulnerable to widespread attacks targeting the recently patched ToolShell zero-day exploit chain. Non-profit security organization Shadowserver is currently tracking over 420 SharePoint servers that are exposed online and remain vulnerable to these ongoing attacks. "Although Microsoft has observed this threat actor deploying Warlock and Lockbit ransomware in the past, Microsoft is currently unable to co

SecurityPal combines AI and experts in Nepal to speed enterprise security questionnaires by 87X or more

Want smarter insights in your inbox? Sign up for our weekly newsletters to get only what matters to enterprise AI, data, and security leaders. Subscribe Now When a tech vendor wants to sell into a large enterprise — or when that enterprise wants to buy software from a tech vendor or AI model provider — each side may be required by the other to prove they will handle shared data responsibly in the form of mandatory surveys and questionnaires. Regulations such as GDPR, the soon-to-be effected EU

Show HN: NativeSwap – Low cost cross-chain swaps without wrappers or bridges

1 Connect Your Wallet Securely connect your preferred wallet (Ctrl, Metamask, or any Web3 wallet) to access your assets across blockchains. Your private keys remain in your control at all times. 2 Select Your Assets Choose your source and destination cryptocurrencies from our extensive list of supported assets. View real-time rates, fees, and estimated transaction times before proceeding with your swap. 3 Confirm Transaction Review the swap details, including exchange rate, fees, and destinati

Microsoft Put Older Versions of SharePoint on Life Support. Hackers Are Taking Advantage

Hundreds of organizations around the world suffered data breaches this week, as an array of hackers rushed to exploit a recently discovered vulnerability in older versions of the Microsoft file-sharing tool known as SharePoint. The string of breaches adds to an already urgent and complex dynamic: Institutions that are longtime SharePoint users can face increased risk by continuing to use the service, just as Microsoft is winding down support for a platform in favor of newer cloud offerings. Mic

Fusion Startup Says It's Figured Out How to Turn Mercury Into Gold

A fusion energy startup claims to have found a way to turn mercury into gold. As the Financial Times reports, San Francisco-based Marathon Fusion says that the same process that could one day represent a limitless source of clean energy could also be used for literal alchemy. As detailed in a yet-to-be-peer-reviewed paper, nuclear transmutation — effectively changing an element or isotope into a different one by ripping out protons from its nucleus — could be used to synthesize gold particles.

Someone Just Sold Their 2011 Bitcoin for a 17 Million Percent Profit

A mysterious Bitcoin account has cashed out a cache of cryptocurrency they originally bought for $54,000 — but which, after HODLing for 14 long years, is now worth an astronomical $9.5 billion, for a staggering profit of over 17 million percent. Bitcoin whales, meaning accounts that hold on to substantial sums of crypto for long periods at a time, have been making moves as of late, Tom's Hardware reports, reaping enormous returns as crypto markets reach all-time highs. Just last week, a differ

What to know about ToolShell, the SharePoint threat under mass exploitation

Government agencies and private industry have been under siege over the past four days following the discovery that a critical vulnerability in SharePoint, the widely used document-sharing app made by Microsoft, is under mass exploitation. Since that revelation, the fallout and the ever-increasing scope of the attacks have been hard to keep track of. What follows are answers to some of the most common questions about the vulnerability and the ongoing exploitation of it, which collectively is be

Microsoft fixes three SharePoint zero-day exploits used in series of cyberattacks - how to patch them

Olemedia / Getty Images Microsoft has patched three critical zero-day SharePoint security flaws that have already been exploited by hackers to attack a larger number of vulnerable organizations. Responding to the exploits, the software giant initially issued fixes just for SharePoint Server Subscription Edition and SharePoint Server 2019 and then eventually rolled out a patch for SharePoint Server 2016 as well. Designated as CVE-2025-53771 and CVE-2025-53770, the two vulnerabilities apply only

FastVLM: Efficient Vision Encoding for Vision Language Models

Vision Language Models (VLMs) enable visual understanding alongside textual inputs. They are typically built by passing visual tokens from a pretrained vision encoder to a pretrained Large Language Model (LLM) through a projection layer. By leveraging the rich visual representations of the vision encoder and the world knowledge and reasoning capabilities of the LLM, VLMs can be useful for a wide range of applications, including accessibility assistants, UI navigation, robotics, and gaming. VLM

Microsoft fixes two SharePoint zero-days under attack, but one is still unresolved - how to patch

Olemedia / Getty Images Microsoft has patched two critical zero-day SharePoint security flaws that have already been exploited by hackers to attack vulnerable organizations. Responding to the exploits, the software giant has issued fixes for SharePoint Server Subscription Edition and SharePoint Server 2019, but is still working on a patch for SharePoint Server 2016. Designated as CVE-2025-53771 and CVE-2025-53770, the two vulnerabilities apply only to on-premises versions of SharePoint, so org

Bitdefender Antivirus Review 2025: CNET's Editors' Choice for Best Antivirus

CNET’s expert staff reviews and rates dozens of new products and services each month, building on more than a quarter century of expertise. 9.5 / 10 SCORE Bitdefender Antivirus $90 at Bitdefender $120 at Walmart Score Breakdown Performance 9 /10 Security 10 /10 Customer Support 9 /10 Usability 10 /10 Value 9 /10 Features 10 /10 Pros Very easy to use Fast scanning Minimal usage of computer processing power and other resources Comprehensive digital footprint visualization Excellent security

US agency responsible for nuclear weapons was breached in Sharepoint hack [U]

More than 10,000 organizations around the world are at risk from hackers after a serious security flaw was discovered in Microsoft’s popular Sharepoint platform, used to store and share confidential documents. The majority of companies at risk are said to be in the US. Update: Bloomberg reports that the National Nuclear Security Administration was among the organizations breached – see the end of the piece … Microsoft said that there were “active attacks targeting on-premises servers.” US fede

Managing EFI boot loaders for Linux: Controlling secure boot (2015)

Managing EFI Boot Loaders for Linux: Controlling Secure Boot by Rod Smith, [email protected] Originally written: 2/22/2015; last update: 3/4/2023 This Web page is provided free of charge and with no annoying outside ads; however, I did take time to prepare it, and Web hosting does cost money. If you find this Web page useful, please consider making a small donation to help keep this site up and running. Thanks! Donate $1.00 Donate $2.50 Donate $5.00 Donate $10.00 Donate another value

Topics: boot db key keys secure

OSS Rebuild: open-source, rebuilt to last

Today we're excited to announce OSS Rebuild, a new project to strengthen trust in open source package ecosystems by reproducing upstream artifacts. As supply chain attacks continue to target widely-used dependencies, OSS Rebuild gives security teams powerful data to avoid compromise without burden on upstream maintainers. The project comprises: Automation to derive declarative build definitions for existing PyPI (Python), npm (JS/TS), and Crates.io (Rust) packages. SLSA Provenance for thousan