Latest Tech News

Stay updated with the latest in technology, AI, cybersecurity, and more

Filtered by: data Clear Filter

How a grad student got LHC data to play nice with quantum interference

Measurements at the Large Hadron Collider have been stymied by one of the most central phenomena of the quantum world. But now, a young researcher has championed a new method to solve the problem using deep neural networks. The Large Hadron Collider is one of the biggest experiments in history, but it’s also one of the hardest to interpret. Unlike seeing an image of a star in a telescope, saying anything at all about the data that comes out of the LHC requires careful statistical modeling. “If

Oxford City Council suffers breach exposing two decades of data

Oxford City Council warns it suffered a data breach where attackers accessed personally identifiable information from legacy systems. The incident has also caused an ICT service disruption, as announced on the website, and although most of the impacted systems have been brought back online, the remaining backlogs may continue to cause delays. Oxford City Council is the local government authority responsible for managing critical public services, such as housing, planning, waste collection, env

Show HN: A Tool to Summarize Kenya's Parliament with Rust, Whisper, and LLMs

Bunge Bits Bunge Bits provides convenient summaries of Kenyan National Assembly and Senate proceedings, making legislative information more accessible and digestible. Motivations The driving force behind Bunge Bits is to strengthen Kenya's democracy by making legislative processes more transparent and understandable to all citizens. The aim is to bridge the gap between complex government proceedings and the average Kenyan, fostering increased civic engagement and political awareness. By offer

Google killed Maps Timeline, so I self-hosted a better one

Dhruv Bhutani / Android Authority As an avid traveler, Google Maps Timeline has long been one of my favorite hidden features. I’m used to opening it on slow Sunday afternoons and wandering through my own travel history. It showed alleyways I had forgotten, long layovers that blurred together while stepping out for a quick brunch across a new city, and impulsive last-minute rail journeys across Eastern Europe that never made it into photos. It’s always felt like a private travel diary logging ev

I changed 10 settings on my Fire TV for better performance and fewer distractions

Why is my Fire TV running so slow? That's a complex question to answer. It could be the age of your device. Older hardware might struggle to load the latest apps and services. But it could also be a combination of outdated software, too many background processes, and accumulated temporary files. All these things can make your Fire TV or Fire TV Stick lag. Fortunately, the tips above address most of these problems. Are there any other Fire TV features I can disable? Amazon's Fire TV has a surp

Topics: apps data disable slow tv

16 billion passwords leaked across Apple, Google, more: What to know and how to protect yourself

Moor Studio/Getty With so much news about data breaches, you have to be careful not to panic each time you hear of a new one. Take the latest report of a major breach. In the headline for a recent story published by Cybernews, the cybersecurity media outlet said that 16 billion passwords were exposed in a record-breaking data breach, opening access to Facebook, Google, Apple, and any other service imaginable. Sounds scary, right? But reading the story itself paints a different picture. Also:

Indie App Spotlight: ‘ClosetLog’ helps you manage your wardrobe in a smarter way

Welcome to Indie App Spotlight. This is a weekly 9to5Mac series where we showcase the latest apps in the indie app world. If you’re a developer and would like your app featured, get in contact. ClosetLog provides you with all of the information you need to know about your wardrobe, and helps you make better decisions on what you should wear. It’s a useful little tool, and helps you balance what you’re wearing on a day-to-day basis. Top features ClosetLog is built with the intention of providi

Record DDoS pummels site with once-unimaginable 7.3Tbps of junk traffic

Large-scale attacks designed to bring down Internet services by sending them more traffic than they can process keep getting bigger, with the largest one yet, measured at 7.3 terabits per second, being reported Friday by Internet security and performance provider Cloudflare. The 7.3Tbps attack amounted to 37.4 terabytes of junk traffic that hit the target in just 45 seconds. That's an almost incomprehensible amount of data, equivalent to more than 9,300 full-length HD movies or 7,500 hours of H

Samsung embeds IronSource spyware app on phones across WANA

In recent months, we have received numerous reports from users across West Asia and North Africa (WANA) expressing alarm over a little-known but deeply intrusive bloatware application—AppCloud—pre-installed on Samsung’s A and M series smartphones. Without users’ knowledge or consent, this bloatware collects sensitive personal data, cannot be removed without compromising device security, and offers no clear information about its privacy practices. AppCloud, developed by the controversial Israeli

Scaling our observability platform by embracing wide events and replacing OTel

TLDR # Observability at scale: Our internal system grew from 19 PiB to 100 PB of uncompressed logs and from ~40 trillion to 500 trillion rows. Efficiency breakthrough: We absorbed a 20× surge in event volume using under 10% of the CPU previously needed. OTel pitfalls: The required parsing and marshalling of events in OpenTelemetry proved a bottleneck and didn’t scale - our custom pipeline addressed this. Introducing HyperDX: ClickHouse-native observability UI for seamless exploration, correlatio

What We Know So Far About the Supposed ‘Mother of All Data Breaches’

Data breaches are so common these days that, when a new one gets announced, most web users can do little more than yawn and mutter something like “Yeah, no shit” before scrolling up to the next story in their newsfeed. This week, however, a breach was announced that was allegedly so earth-shatteringly huge that it managed to break through the internet’s wall of collective cynicism. Dubbed the “Mother of All Data Breaches,” the breach is said to involve some 16 billion user credentials, and impa

How a data center company uses stranded renewable energy

This article originally appeared on Inside Climate News, a nonprofit, non-partisan news organization that covers climate, energy, and the environment. Sign up for their newsletter here. John Belizaire says he has a secret hiding in plain sight. But before revealing it, the CEO of Soluna, a green data center development firm headquartered in Albany, New York, asks people to picture the last time they drove through a gusty stretch of countryside and saw wind turbines in the distance. But when the

3 tips I use every time I travel to avoid exorbitant roaming fees

Ryan Haines / Android Authority I still remember when my husband got slapped with an exorbitant €70 extra fee on his €10 basic mobile plan because he mistakenly went online for a few minutes during a layover in Turkey. Since then, avoiding roaming fees has been our personal crusade, especially since we like travelling and our basic local data plans have ridiculously expensive fees when we step outside of Europe. Over the years, I’ve put together a three-prong strategy to avoid paying for roami

Unexpected security footguns in Go's parsers

In Go applications, parsing untrusted data creates a dangerous attack surface that’s routinely exploited in the wild. During our security assessments, we’ve repeatedly exploited unexpected behaviors in Go’s JSON, XML, and YAML parsers to bypass authentication, circumvent authorization controls, and exfiltrate sensitive data from production systems. These aren’t theoretical issues—they’ve led to documented vulnerabilities like CVE-2020-16250 (a Hashicorp Vault authentication bypass found by Goog

ClickHouse scales beyond 100 petabytes of logs

TLDR # Observability at scale: Our internal system grew from 19 PiB to 100 PB of uncompressed logs and from ~40 trillion to 500 trillion rows. Efficiency breakthrough: We absorbed a 20× surge in event volume using under 10% of the CPU previously needed. OTel pitfalls: The required parsing and marshalling of events in OpenTelemetry proved a bottleneck and didn’t scale - our custom pipeline addressed this. Introducing HyperDX: ClickHouse-native observability UI for seamless exploration, correlatio

​​How to Become a Backyard Naturalist With Just Your Smartphone

In the early days of summer, backyards come to life. Warmer temperatures transform spring buds into lush greenery, coax insects from their winter slumber, and invite newborn animals to explore their surroundings on wobbling legs or wings. With smartphones, documenting this emerging wildlife has never been easier. These days, all the tools you need to become a backyard naturalist fit right in the palm of your hand. And while June is an especially good time to start, you can use your phone to obs

Israel Says Iran Is Hacking Security Cameras for Spying

Amid Israeli airstrikes this week and the imminent threat of further escalations by the United States, Iran started severely limiting internet connectivity for its citizens, limiting Iranians' access to crucial information and intentionally pushing them toward domestic apps that may not be secure. Meanwhile, the Israel-tied hacking group known as Predatory Sparrow is waging cyberwar on Iran’s financial system, attacking Iran’s Sepah Bank and destroying more than $90 million in cryptocurrency hel

Samsung Embeds IronSource Spyware App on Phones Across WANA

In recent months, we have received numerous reports from users across West Asia and North Africa (WANA) expressing alarm over a little-known but deeply intrusive bloatware application—AppCloud—pre-installed on Samsung’s A and M series smartphones. Without users’ knowledge or consent, this bloatware collects sensitive personal data, cannot be removed without compromising device security, and offers no clear information about its privacy practices. AppCloud, developed by the controversial Israeli

I Dropped the Production Database on a Friday Night

How I Dropped the Production Database on a Friday Night The case for moving fast and breaking things (before your competitors kill you) The worst 7PM in my software engineering career Picture this: It's a Friday evening in Paris, and I'm wrapping up what should have been a routine week at Joe AI, the real-estate startup where we were building an AI agent that automated communications for property developers across France. I had just finished what I thought was a clean migration: moving our en

Heard about the 16 billion passwords leak? Here are the facts and how to protect yourself

Moor Studio/Getty With so much news about data breaches, you have to be careful not to panic each time you hear of a new one. Take the latest report of a major breach. In the headline for a recent story published by Cybernews, the cybersecurity media outlet said that 16 billion passwords were exposed in a record-breaking data breach, opening access to Facebook, Google, Apple, and any other service imaginable. Sounds scary, right? But reading the story itself paints a different picture. Also:

NASA Aircraft Set to Perform Wild Low-Altitude Stunts Around These U.S. Cities

NASA is getting ready to fly two planes over mid-Atlantic states and parts of California, where they will be carrying out special maneuvers at a close distance while collecting valuable data about our changing planet. The two research aircraft, named P-3 Orion (N426NA) and a King Air B200 (N46L), are set to fly over Baltimore, Philadelphia, the Virginia cities of Hampton, Hopewell, and Richmond, in addition to the Los Angeles Basin, Salton Sea, and Central Valley, according to NASA. The flights

Record DDoS pummels site with once-unimaginable 7.3Tbps of junk traffic

Large-scale attacks designed to bring down Internet services by sending them more traffic than they can process keep getting bigger, with the largest one yet, measured at 7.3 terabits per second, being reported Friday by Internet security and performance provider Cloudflare. The 7.3Tbps attack amounted to 37.4 terabytes of junk traffic that hit the target in just 45 seconds. That's an almost incomprehensible amount of data, equivalent to more than 9,300 full-length HD movies or 7,500 hours of H

Billions of login credentials have been leaked online

NEW YORK (AP) — Researchers at cybersecurity outlet Cybernews say that billions of login credentials have been leaked and compiled into datasets online, giving criminals “unprecedented access” to accounts consumers use each day. According to a report published this week, Cybernews researchers have recently discovered 30 exposed datasets that each contain a vast amount of login information — amounting to a total of 16 billion compromised credentials. That includes user passwords for a range of p

16 billion passwords leaked from Apple, Google, more: Here are the facts and how to protect yourself

Moor Studio/Getty With so much news about data breaches, you have to be careful not to panic each time you hear of a new one. Take the latest report of a major breach. In the headline for a recent story published by Cybernews, the cybersecurity media outlet said that 16 billion passwords were exposed in a record-breaking data breach, opening access to Facebook, Google, Apple, and any other service imaginable. Sounds scary, right? But reading the story itself paints a different picture. Also:

A Python-first data lakehouse

“Good design is actually a lot harder to notice than poor design, in part because good designs fit our needs so well that the design is invisible”. Donald A. Norman, The Design of Everyday Things. Data and ML scientists - A life in the middle Despite AI eating the world and data becoming one of the most important things for every company on the planet, but getting models from prototype to production is still pretty problematic. According to HBR , fewer than 1 in 5 models ever make it into prod

Cloudflare blocks record 7.3 Tbps DDoS attack against hosting provider

Cloudflare says it mitigated a record-breaking distributed denial of service (DDoS) attack in May 2025 that peaked at 7.3 Tbps, targeting a hosting provider. DDoS attacks flood targets with massive amounts of traffic with the sole aim to overwhelm servers and create service slowdowns, disruptions, or outages. This new attack, which is 12% larger than the previous record, delivered a massive data volume of 37.4 TB in just 45 seconds. This is the equivalent of about 7,500 hours of HD streaming o

Are 16 billion compromised passwords really part of a newly discovered data breach?

A hot potato: Researchers have reportedly discovered a massive, unprecedented archive containing billions upon billions of compromised user credentials. Dubbed the "Mother of All Breaches," the archive has sparked debate among experts about the true significance of this newly uncovered trove. According to UN sources, the world population surpassed eight billion people in 2022. Now, Cybernews reporters claim they have uncovered a new record-breaking data breach exposing 16 billion passwords link

How to clear your Android phone cache (and why you should do it before installing Android 16)

Elyse Betters Picaro / ZDNET Google recently released Android 16 to Pixel devices and select OEMs, bringing performance improvements, new Material You changes, and more upgrades. If you want to try this update but are hesitant because you've noticed your Android phone or tablet already feels too sluggish, clearing app and browser caches can give it a fresh boost and free up some storage space. Over time, cached data can accumulate, become corrupted, or simply get outdated, which may slow down

Do you use mobile data while connected to Wi-Fi? It’s complicated.

Robert Triggs / Android Authority When it comes to smartphones, the common sentiment is that your Wi-Fi network will always take precedence over your mobile connection. In other words, those with data caps generally don’t have to worry about mobile data being consumed during lengthy Wi-Fi sessions. But is this always true? Generally, yes, but the situation is slightly more complicated than you might think. There are indeed a few reasons your phone could end up using mobile data even when connec

Topics: data fi mobile turn wi

184 million passwords for Google, Microsoft, Facebook, and more leaked in massive data breach

JuSun/Getty Images Yet another data breach has exposed passwords and other sensitive information – but this one is a whopper. Cybersecurity researcher Jeremiah Fowler revealed his discovery of a massive online database containing more than 184 million unique account credentials, in a report published late last month. Usernames, passwords, emails, and URLs for a host of applications and websites, including Google, Microsoft, Apple, Facebook, Instagram, and Snapchat, among others, were stored in