Latest Tech News

Stay updated with the latest in technology, AI, cybersecurity, and more

Filtered by: ting Clear Filter

Web fingerprinting is worse than I thought (2023)

If you are reading this article, you are most likely using a web browser, and you have some expectations or beliefs about online privacy and security. For example, I do not know what you are reading on other tabs on your web browser, and you would like to keep it that way. But the websites themselves know that you are reading a particular page on their website. They most likely know your IP address and if you are signed in to their website, they also know your identity. This is not unreasonable

Writing Is Thinking

Writing scientific articles is an integral part of the scientific method and common practice to communicate research findings. However, writing is not only about reporting results; it also provides a tool to uncover new thoughts and ideas. Writing compels us to think — not in the chaotic, non-linear way our minds typically wander, but in a structured, intentional manner. By writing it down, we can sort years of research, data and analysis into an actual story, thereby identifying our main messag

This Nearly Perfect Gaming Keyboard Is Held Back by a Few Big Compromises

Finding the perfect keyboard can often feel like looking for a needle in a haystack. There's no shortage of mechanical keyboards offering a whole range of features and hardware options. While the "perfect keyboard" likely doesn't exist, there are certainly some good ones to be found. Finding a solid balance between hardware, features and price can be daunting. While Cherry's MX 8.2 TKL keyboard delivers fantastic hardware, there are compromises as well. I spent several weeks typing and gaming o

Jitsi privacy flaw enables one-click stealth audio and video capture

Jitsi is an open-source web conferencing application. Jitsi also hosts a public instance, with millions of monthly active users. Attack scenario Let’s walk through an example. An attacker runs a meeting called `MiniGinger` on the public Jitsi instance meet.jit.si. When a user visits the attacker controller webpage `CuteCats.com`, in the background they are redirected to: https://meet.jit.si/MiniGinger#config.prejoinConfig.enabled=false If the user visited any other Jitsi meeting before and

Major rule about cooking meat turns out to be wrong

Contrary to common belief, resting meat isn’t really about retaining juices, but that doesn’t mean it’s pointless. Instead, it’s best understood as a temperature-control method for managing carryover cooking. To use it effectively, though, you have to completely rethink how the technique works and how to apply it. Is dark matter real? How do consciousness and memory actually work? And is it really necessary to rest your meat after cooking? These are the big, unresolved questions that keep scien

Major Rule About Cooking Meat Turns Out to Be Wrong

Contrary to common belief, resting meat isn’t really about retaining juices, but that doesn’t mean it’s pointless. Instead, it’s best understood as a temperature-control method for managing carryover cooking. To use it effectively, though, you have to completely rethink how the technique works and how to apply it. Is dark matter real? How do consciousness and memory actually work? And is it really necessary to rest your meat after cooking? These are the big, unresolved questions that keep scien

I Tried T-Mobile's New Satellite Service for Texting in Dead Zones. Here's How It's Different

If you've traveled to remote areas where cellular coverage doesn't reach, you know that anxious feeling when your communications slam to a halt. T-Mobile's new $10 a month Starlink-based satellite texting service, T-Satellite, which went live today, takes a different approach from other satellite services to provide mobile access even within the half a million square miles of wireless dead zones in the US. To test it out, I drove nearly three hours from Seattle until my phone bars abandoned me,

Microsoft's big AI update for Windows 11 is here - what's new

Kyle Kucharski/ZDNET Windows 11 users will find a host of new features awaiting them with a major update now being rolled out by Microsoft. Launched on Tuesday specifically for Windows 11 24H2, the optional update known as KB5062660 carries with it a cavalcade of AI-powered skills along with general enhancements and bug fixes galore. In a Tuesday blog post, Microsoft touted all the new AI tools and tricks in the update. For better or worse, most of these are geared toward Copilot+ PCs, so if y

I Tested T-Mobile's Satellite Service: The Hardest Part Was Finding a Dead Zone

Driving the wooded highways of the North Cascades in Washington state, I deliberately pointed my car toward nothing. Specifically, I needed to get out of Seattle to find an area with no cellular coverage so I could try out T-Mobile's new Starlink-based satellite texting service, T-Satellite, with my phone. It was more difficult than I expected. Most areas of the US are covered by some level of cellular service. But that still leaves around 500,000 square miles of wireless dead zones, according

How to harden your Active Directory against Kerberoasting

Kerberoasting is a common attack targeting Microsoft Active Directory, enabling attackers to compromise service accounts with low risk of detection. Because it manipulates legitimate accounts, it can be highly effective. However, robust password security can keep the criminals at bay. First, what is Kerberoasting? The name comes from ‘Kerberos’, the authentication protocol used in Active Directory, which verifies a user’s identity or that of a computer requesting access to resources. Kerberoas

Using Radicle CI

Using Radicle CI for Development In this blog post I show how I use Radicle and its CI support for my own software development. Published by lars on 23.07.2025 In this blog post I show how I use Radicle and its CI support for my own software development. I show how I start a project, add it to Radicle, add CI support for it, and manage patches and issues. I have been working full time on Radicle CI for a couple of years now. All my personal Git repositories are hosted on Radicle. Radicle CI

I tested two new Govee indoor lights and turned my place into an enchanting light show

Govee Table Lamp 2 Pro x Sound by JBL The Govee Table Lamp 2 Pro x Sound by JBL offers gorgeous lighting effects and Bluetooth speaker functionality. It sounds great and will look even better. While there are better speakers at its price point, none of them look as good as this one. You can never have enough RGB lighting, right? Not only does it definitely improve fps while gaming (this is scientifically proven), but these lights can set the mood and turn any space into a mesmerizing light show

How to turn off ACR on your TV (and why you shouldn't wait to do it)

Adam Breeden/ZDNET Did you know that whenever you turn on your smart TV, you invite an unseen guest to watch it with you? These days, most popular TV models utilize automatic content recognition (ACR), a form of ad surveillance technology that gathers information about everything you watch and transmits it to a centralized database. Manufacturers then use your data to identify your viewing preferences, enabling them to deliver highly targeted ads. Also: Your TV's USB port is seriously underut

‘Clayface’ May Be Adding a ‘Star Wars’ Star

Sarah Michelle Gellar has a teasing update for the Buffy revival. The next Evil Dead has begun filming. Get a look at Ne Zha II‘s western debut. Plus, Lestat returns in rocking fashion in new pictures from Interview With the Vampire season 3. Spoilers now! Clayface According to THR, Naomie Ackie has joined the cast of Clayface in a currently undisclosed role. Mr. Terrific As noted by Knife Edge Media’s Caleb Williams (via Comic Book), DC has filed a copyright for a potential Mr. Terrific pro

Hundreds of organizations breached by SharePoint mass-hacks

Security researchers say hackers have breached at least 400 organizations by exploiting a zero-day vulnerability in Microsoft SharePoint, signalling a sharp rise in the number of detected compromises since the bug was discovered last week. Eye Security, a Dutch cybersecurity firm that first identified the vulnerability in SharePoint, a popular server software that companies use to store and share internal documents, said it had identified hundreds of affected SharePoint servers by scanning the

Apple's Liquid Glass: When Aesthetics Beat Function

I watched the initial presentation during WWDC 2025. My initial thought was: they're getting people used to transparent UIs for spatial computing (mixed reality environments where digital interfaces blend with the physical world). My immediate second thought was, 'wow, you can't read a thing - are they serious?'. Skeuomorphism done right (and wrong) Designers have always borrowed from the real world, though these metaphors often outlive their origins. The universal save icon? Still a floppy di

I Played ‘Cyberpunk 2077’ on Mac and It Feels Perilously Close to PC Gaming

Cyberpunk 2077 strode like a solo cyberninja onto MacBooks with the kind of swaggering bravado you’d expect from a chromed-up Night City merc. Knowing you can run CD Projekt Red’s graphically intense game, even if not at the peak ultra settings, is a mark of how well the device plays AAA titles. In case you missed it, Cyberpunk is now on Mac, and I’ve tested it on a plethora of Apple’s M-series laptops from the last few years. The good news is it’s playable, but for many Apple fans, this will be

Org tutorials

This tutorial describes a workflow for running a series of meetings, for example of a commission or any other group, and for keeping track of the groups tasks. Link to the tutorial. You may also want to check this message by Christian Egli about his own setup for taking notes during meetings.

Microsoft links Sharepoint ToolShell attacks to Chinese hackers

Several hacking groups with ties to the Chinese government have been linked to a recent wave of widespread attacks targeting a Microsoft SharePoint zero-day vulnerability chain. They used this exploit chain (dubbed "ToolShell") to breach dozens of organizations worldwide after hacking into their on-premise SharePoint servers. "Microsoft has observed two named Chinese nation-state actors, Linen Typhoon and Violet Typhoon exploiting these vulnerabilities targeting internet-facing SharePoint serv

Windows 11 KB5062660 update brings new 'Windows Resilience' features

​​Microsoft has released the KB5062660 preview cumulative update for Windows 11 24H2 with twenty-nine new features or changes, with many gradually rolling out, such as the new Black Screen of Death and Quick Machine Recovery tool. The KB5062660 update is part of the company's optional non-security preview updates schedule, which releases updates at the end of each month to test new fixes and features coming to next month's August Patch Tuesday. Unlike regular Patch Tuesday cumulative updates,

Cosmic Dawn: The Untold Story of the James Webb Space Telescope

Go behind the scenes with the dedicated NASA team and its partners to uncover the untold story of the James Webb Space Telescope. “Cosmic Dawn” unveils the immense challenges, groundbreaking innovations, and extraordinary efforts behind humanity’s most powerful eye on our universe, from its complex development to its nail-biting deployment a million miles away.

From Cartography to Code: Architectures of Power at the Venice Biennale 2025

At the 19th edition of the Venice Architecture Biennale, curated by Carlo Ratti under the theme Intelligens: Natural. Artificial. Collective, the Silver Lion for promising participation was awarded to Calculating Empires: A Genealogy of Technology and Power Since 1500 – an urgent, masterfully researched and executed data visualisation by Prof. Kate Crawford, a leading scholar of the social and political impacts of artificial intelligence, and Prof. Vladan Joler, an academic and artist whose work

How Virtual Design Can Change the Future of Research and Development

Integrating physical and virtual testing environments into research and development (R&D) is rapidly moving from a cutting-edge concept to standard practice across many industries. Organizations that take this approach gain a variety of benefits that improve efficiency. Among the advantages is the ability to minimize prototype builds, optimize test cell usage, and enable faster design iterations through digital twin technology and data feedback loops between physical testing and engineering mode

MakeShift: Security Analysis of Shimano Di2 Wireless Gear Shifting in Bicycles

The bicycle industry is increasingly adopting wireless gear-shifting technology for its advantages in performance and design. In this paper, we explore the security of these systems, focusing on Shimano's Di2 technology, a market leader in the space. Through a blackbox analysis of Shimano's proprietary wireless protocol, we uncovered the following critical vulnerabilities: (1) A lack of mechanisms to prevent replay attacks that allows an attacker to capture and retransmit gear shifting commands;

Sutton SignWriting is a writing system for sign languages

SignWriting was invented in 1974 by Valerie Sutton , a ballet dancer who eight years earlier had developed a dance notation named Sutton DanceWriting . [8] The current standardized form of SignWriting is known as the International Sign Writing Alphabet (ISWA). [9] The SignWriting system is visually iconic: its symbols depict the hands, face, and body of a signer. And unlike most writing systems, which are written linearly, the symbols of SignWriting are written two-dimensionally, to represent t

Scientists Find Evidence of Grim Long-Term Effects of Fad Diets

Image by Getty Images Studies The way Westerners diet — often alternating dubious and restrictive food regimens with binge eating, in a phenomenon known as "yo-yo dieting" — may be messing with their gut flora and their brains. In a new study published in the journal Advanced Science, researchers from France's University of Rennes and Paris-Saclay University found, after conducting a series of studies with mice, that yo-yo diets appeared to result in long-lasting changes to their gut bacteria.

Will the Fear of Being Confused for AI Mean That We Will Now Write Differently?

by David Beer Could there be anything more insulting for a writer than someone assuming that their writing is an output of generative artificial intelligence? The mere possibility of being confused for a neural network is enough to make any creative shudder. When it happens, and it will happen, it will inevitably sting. By implication, being mistaken for AI is to be told that your writing is so basic, so predictable, so formulaic, so replicable, so obvious, so neat, so staid, so emotionless, s

I avoid using LLMs as a publisher and writer

Now for my more detailed arguments. Reason 1: I don’t want to become cognitively lazy In a recent study by MIT researchers (Your Brain on ChatGPT: Accumulation of Cognitive Debt When Using an AI Assistant for Essay Writing Task) demonstrated using LLMs when writing essays reduces the originality of the resulting work. More notably, when measured using an EEG, LLMs also diminish brain connectivity compared to when participants were allowed to use only their brains or a search engine. People who

James Gunn and DC Haven’t Started Casting Wonder Woman… Yet

The holy trilogy of James Gunn’s DC Universe is slowly coming together. Part one, of course, is Superman, which is now in theaters. A Batman movie is being written (in addition to Matt Reeves’ new Batman movie), and, of late, there’s been lots of talk about Wonder Woman too. As co-president of DC Studios, Gunn recently confirmed a Wonder Woman script is being written, and subsequent rumors suggested the film was being fast-tracked. Well, that’s partially true, Gunn said. “It’s a priority, but I

How We Test Antivirus Software

Protecting your devices from viruses and other malware is incredibly important, but effective antivirus detection isn’t the only thing to consider when choosing security software. You also want to ensure that the program won’t slow your devices down or interfere with everyday tasks. And if you’re buying a full cybersecurity suite, you’ll need to make sure it covers most or all of your security needs. Our testing processes are designed to help you find antivirus tools that meet all of these crit