Latest Tech News

Stay updated with the latest in technology, AI, cybersecurity, and more

Filtered by: cc Clear Filter

ACM Transitions to Full Open Access

ACM's Transition to Full Open Access: A New Era for Computing Research For more than seven decades, ACM has played a pivotal role in advancing computing research, fostering collaboration, and disseminating knowledge through its world-class Digital Library, influential publications, and premier conferences. In a significant step to broadening access to computing research, ACM is transitioning to a fully Open Access (OA) publishing model by the end of 2025. This bold move marks a pivotal moment

Microsoft bans LibreOffice developer's account without warning, rejects appeal

When you purchase through links on our site, we may earn an affiliate commission. Here’s how it works Recently, we reported on LibreOffice, accusing Microsoft of intentionally using complex file formats as a tactic to lock in users to Microsoft Office, hindering open source alternatives like LibreOffice. Now, Microsoft has banned LibreOffice developer, Mike Kaganski, from using its services, citing an "activity that violates [its] Services Agreement". According to Mike, this happened last Mon

YouTube is turning over age verification to AI

YouTube will start using machine learning to determine whether viewers should be on a teen account. The company said it plans to start using this AI application on a subset of US users in the coming weeks for a trial before rolling it out to the rest of the market. The tool will assess user behaviors including the types of videos being searched for, the categories of videos watched and how long the account has existed. When an account is deemed by machine learning to belong to a teen, YouTube wi

Russian airline Aeroflot grounds dozens of flights after cyberattack

Aeroflot, Russia's flag carrier, has suffered a cyberattack that resulted in the cancellation of more than 60 flights and severe delays on additional flights. Although official sources from Russia, like the General Prosecutor's Office, did not attribute the attack to specific threat groups or even origin, responsibility was taken by Ukrainian and Belarusian hacktivist collectives 'Silent Crow' and 'Cyberpartisans BY.' The latter are known for previous attacks on the Belarusian Railway, the cou

Google Workspace is rolling out a security update to stop token stealing attacks

is a news writer who covers the streaming wars, consumer tech, crypto, social media, and much more. Previously, she was a writer and editor at MUO. Google Workspace is launching a new security measure to help prevent the same type of account takeover attack that impacted Linus Tech Tips. The feature, which is rolling out in beta for Chrome users on Windows, is designed to block bad actors from remotely stealing the cookies that keep you logged into your Workspace account. Google calls the feat

How attackers are still phishing "phishing-resistant" authentication

As awareness grows around many MFA methods being “phishable” (i.e. not phishing resistant), passwordless, FIDO2-based authentication methods (aka. passkeys) like YubiKeys, Okta FastPass, and Windows Hello are being increasingly advocated. This is a good thing. The most commonly used MFA factors (like SMS codes, push notifications, and app-based OTP) are routinely bypassed, with modern reverse-proxy “Attacker-in-the-Middle” phishing kits the most common method (and the standard choice for phishi

You won't regret buying these two Moft MagSafe accessories for your iPhone - here's why

The Moft Tripod accessory. Kayla Solino/ZDNET Everyone loves affordable upgrades. And MagSafe accessories are the easiest way to elevate your phone's design and function. At ZDNET, I test dozens of MagSafe accessories, from battery packs to wallets, phone cases, tripods, and more. And as a mobile accessory expert, there are genuinely a few that I reach for nearly every day that stand out from the mountains of MagSafe gear I've tried. The Moft MagSafe Tripod and the Moft MagSafe wallet are two

Mysterious Petroglyphs Reemerge on Oahu Beach

Shifting sands have once again revealed mysterious petroglyphs on the shores of a remote group of islands. The carvings appear and disappear depending on the water current, sometimes remaining hidden for years at a time before returning like a divine omen. But they’re not (as far as we know) an auspice, and this isn’t a fantasy movie. The petroglyphs are carved in sandstone along a beach on Oahu’s west coast, in front of a U.S. Army recreation center, and could be over 1,000 years old, as first

Software Development at 800 Words per Minute

Software Development at 800 Words Per Minute Jul 24, 2025, 12:19 AM (updated Jul 28, 2025, 10:18 PM ) Imagine reading code not by looking at the screen, but by listening to interface elements, variables, language constructs and operators read at 800 words per minute (WPM) - over 5 times faster than normal speech. It sounds like gibberish to most, but to me, it’s as natural as you reading this sentence. If you’ve ever wondered how someone codes without seeing the screen, or if you’re curious a

The Most Amazing Cosplay of San Diego Comic-Con 2025, Day 3

Saturday at San Diego Comic-Con 2025 had everyone’s best cosplay out in full force. Characters from across the fandom-verse showed up. While Peacemaker, It: Welcome to Derry, and Hazbin Hotel were not only some of the weekend’s most memorable events, but the hard work of talented cosplayers saw fans from all these fandoms (and many, many more) bring them to life with incredible costumes. Here are some of our favorite looks from over the weekend as the convention starts to draw to a close on ano

Wi-Fi 8 detailed, even if it's years away: More stable connections, lower latency

Serving tech enthusiasts for over 25 years.TechSpot means tech analysis and advice you can trust Forward-looking: The latest devices are only now starting to support Wi-Fi 7, and so Wi-Fi 8 remains several years away, but members of the group that defines Wi-Fi standards are already previewing what comes next. Wi-Fi 8 is designed to deliver more reliable connections, particularly in crowded and high-traffic public environments. A blog post from Qualcomm details several new technologies the com

Scattered Spider is running a VMware ESXi hacking spree

Scattered Spider hackers have been aggressively targeting virtualized environments by attacking VMware ESXi hypervisors at U.S. companies in the retail, airline, transportation, and insurance sectors. According to the Google Threat Intelligence Group (GITG), the attackers keep employing their usual tactics that do not include vulnerability exploits but rely on perfectly executed social engineering "to bypass even mature security programs." A Scattered Spider attack The researchers say that th

Solid protocol restores digital agency

How Solid Protocol Restores Digital Agency The current state of digital identity is a mess. Your personal information is scattered across hundreds of locations: social media companies, IoT companies, government agencies, websites you have accounts on, and data brokers you’ve never heard of. These entities collect, store, and trade your data, often without your knowledge or consent. It’s both redundant and inconsistent. You have hundreds, maybe thousands, of fragmented digital profiles that ofte

Apple @ Work: Apple makes Managed Apple Account transitions easier for IT at scale

Apple @ Work is exclusively brought to you by Mosyle, the only Apple Unified Platform. Mosyle is the only solution that integrates in a single professional-grade platform all the solutions necessary to seamlessly and automatically deploy, manage & protect Apple devices at work. Over 45,000 organizations trust Mosyle to make millions of Apple devices work-ready with no effort and at an affordable cost. Request your EXTENDED TRIAL today and understand why Mosyle is everything you need to work with

Microsoft to stop using China-based teams to support Department of Defense

Last week, Microsoft announced that it would no longer use China-based engineering teams to support the Defense Department’s cloud computing systems, following ProPublica’s investigation of the practice, which cybersecurity experts said could expose the government to hacking and espionage. But it turns out the Pentagon was not the only part of the government facing such a threat. For years, Microsoft has also used its global workforce, including China-based personnel, to maintain the cloud syst

Meta Debuts More Instagram Protections for Teen Users. Here's What's New

Meta this week unveiled the latest efforts it's making to bolster the safety of teens and kids on its social media apps, with a particular focus on the teen-skewing Instagram. The company has touted these new features for Instagram in a blog post, most notably adding more information and warnings about accounts that teens might try to contact via direct messages. "We've added new safety features to DMs in Teen Accounts to give teens more context about the accounts they're messaging and help the

Do not download the app, use the website

The 2010s was the Wild West of the mobile world. "Mobile-first" was the buzzword, much like "AI-first" is today. Every company, from the biggest social media giants to your local pizza parlor, seemed to be pestering you to download their app. There was a genuine hype train, and everyone was on board. The apps, frankly, were always mediocre, and a far cry from the full functionality of their website counterparts. But the message was clear. If you weren't on mobile, you were falling behind. Fast

Microsoft investigates outage affecting Microsoft 365 admin center

Microsoft is investigating an ongoing outage blocking Microsoft 365 administrators with business or enterprise subscriptions from accessing the admin center. While the company has yet to disclose which regions are currently affected by this ongoing service degradation issue, it's currently tracking it on its official service health status page to provide impacted organizations with access to up-to-date information. "Microsoft is investigating a potential issue that may be preventing administra

Skydance deal allows Trump’s FCC to “censor speech” and “silence dissent” on CBS

The Federal Communications Commission has approved Skydance's $8 billion acquisition of Paramount, which owns CBS. But the agency's approval drew fiery dissent from the only Democratic commissioner, Anna Gomez, after requiring written commitments from Skydance that allow the government to influence editorial decisions at CBS. Gomez accused the FCC of "imposing never-before-seen controls over newsroom decisions and editorial judgment, in direct violation of the First Amendment and the law." Und

ICE Plans to Track Over 180,000 Immigrants With Ankle Monitors: Report

ICE plans to expand its use of electronic surveillance of immigrants from about 24,000 people currently fitted with GPS ankle monitors to about 183,000 people, according to a report from the Washington Post. The move will continue to shovel money to the private prison industry, which has been making money hand over fist since President Donald Trump was inaugurated for a second time in January. ICE released an internal memo on June 9 about the so-called Alternatives to Detention program, which a

FCC approves Skydance's $8 billion Paramount acquisition

Regulators won't stand in the way of Skydance's Paramount acquisition. The Federal Communications Commission has approved the $8 billion purchase of Paramount Global and its subsidiaries, including the parent company of CBS Network. In a statement, FCC Chairman Brendan Carr said he welcomes "Skydance’s commitment to make significant changes at the once storied CBS broadcast network." Skydance, he said, has made written commitments to ensure that its "news and entertainment programming will embod

No, Instagram didn’t suspend Zohran Mamdani’s account for being ‘too socialist’

is features writer with five years of experience covering the companies that shape technology and the people who use their tools. In a story published earlier this week, a site called “NYC Journals” claimed to have a bombshell: that Instagram had suspended the account of New York mayoral candidate Zohran Mamdani for being “too socialist.” The story claimed that Mamdani’s account was down for three hours; it also cited a “leaked memo” from inside Instagram that said his content went against US

Paramount-Skydance merger approved after companies agree to government speech demands

is a senior policy reporter at The Verge, covering the intersection of Silicon Valley and Capitol Hill. She spent 5 years covering tech policy at CNBC, writing about antitrust, privacy, and content moderation reform. The Federal Communications Commission (FCC) has approved Skydance’s $8 billion purchase of CBS-owner Paramount after the companies agreed to end diversity, equity, and inclusion (DEI) programs but feature a “diversity of viewpoints from across the political and ideological spectrum

Don’t get your hopes up for One UI 9 leaks as Samsung fixes this major loophole

Mishaal Rahman / Android Authority TL;DR Samsung has patched a loophole that enabled many recent One UI leaks. The exploit allowed users to access internal OTA builds via a custom tool and decrypt metadata. You almost certainly won’t be treated to as many One UI 9 leaks going forward. The Samsung fans among you enjoy delving into One UI leaks, and we enjoy bringing them to you when they surface. The bad news for all of us is that it looks like the party might be over. According to a report

RFK Jr.’s anti-vaccine group sues him: “This is not the Bobby we know”

A lawyer who represents Children's Health Defense—the rabid anti-vaccine organization founded by the equally fervent anti-vaccine advocate and current US health secretary, Robert F. Kennedy Jr.—has filed a lawsuit against Kennedy, alleging that he has failed to set up a task force to promote safer childhood vaccinations. The task force's creation is outlined in the National Childhood Vaccine Injury Act of 1986, which is mainly known for setting up the National Vaccine Injury Compensation Progra

A Premium Luggage Service’s Web Bugs Exposed the Travel Plans of Every User—Including Diplomats

An airline leaving all of its passengers’ travel records vulnerable to hackers would make an attractive target for espionage. Less obvious, but perhaps even more useful for those spies, would be access to a premium travel service that spans 10 different airlines, left its own detailed flight information accessible to data thieves, and seems to be favored by international diplomats. That's what one team of cybersecurity researchers found in the form of Airportr, a UK-based luggage service that p

Mitel warns of critical MiVoice MX-ONE authentication bypass flaw

Mitel Networks has released security updates to patch a critical-severity authentication bypass vulnerability impacting its MiVoice MX-ONE enterprise communications platform. MX-ONE is the company's SIP-based communications system, which can scale to support hundreds of thousands of users. The critical security flaw is due to an improper access control weakness discovered in the MiVoice MX-ONE Provisioning Manager component and has yet to be assigned a CVE ID. Unauthenticated attackers can exp

Use Your Type System

Today I'm discussing a trivially simple technique that I've rarely seen used in production codebases. In programming, we often need to deal with simple values that can be represented by simple, generic types built into our programming language or provided by libraries: types like integer, string, or UUID. In any nontrivial codebase, this inevitably leads to bugs when, for example, a string representing a user ID gets used as an account ID, or when a critical function accepts three integer argu

Shattering the rotation illusion: The attacker view and AWSKeyLockdown (2024)

PDF Report Shattering the Rotation Illusion: How Quickly Leaked AWS Keys are Exploited Download Now -> Through the Attacker’s Eyes: A New Era of NHI Security This final installment in our blog series brings together everything we’ve uncovered about leaked AWS Access Keys—how attackers exploit them, why traditional security measures fall short, and what organizations can do to protect themselves. Over the series, we explored real-world scenarios across various platforms: GitHub and GitLab, Pac