Latest Tech News

Stay updated with the latest in technology, AI, cybersecurity, and more

Filtered by: cc Clear Filter

VectorDB bench now support S3Vector

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community. By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails. Already on GitHub? Sign in to your account

Shattering the Rotation Illusion: The Attacker View & AWSKeyLockdown

PDF Report Shattering the Rotation Illusion: How Quickly Leaked AWS Keys are Exploited Download Now -> Through the Attacker’s Eyes: A New Era of NHI Security This final installment in our blog series brings together everything we’ve uncovered about leaked AWS Access Keys—how attackers exploit them, why traditional security measures fall short, and what organizations can do to protect themselves. Over the series, we explored real-world scenarios across various platforms: GitHub and GitLab, Pac

Bracing for a Recession? These Accounts Can Keep Your Money Safe

The best place for your cash depends on what you're using it for. PM Images/Getty Images A recession may not be as likely as it seemed earlier this year, at least according to some forecasts. But economic uncertainty is still forcing us to be cautious about our finances. From high prices to layoffs, the big financial struggles are out of our control. However, one thing we can do to help ourselves weather the ups and downs is to make sure our money is in the right place. Keeping your cash safe

Gig Speeds for Every American? Trump FCC Moves to Drop One of the Group’s Most Ambitious Goals

One of the federal government’s most ambitious broadband targets may soon be abandoned. On August 7, the FCC will vote on a proposal to drop its goal of gig speeds for every American. In March last year, the Democratic-led group voted to raise the definition of minimum broadband speeds from 25Mbps download and 3Mbps upload speed to 100/20Mbps. It also set a more ambitious long-term goal of increasing the benchmark to 1,000Mbps download and 500Mbps upload speed. Trump’s pick for FCC chair, Bren

IBM shares drop despite earnings beat

IBM CEO Arvind Krishna appears at the World Economic Forum in Davos, Switzerland, on Jan. 16, 2024. IBM shares fell as much as 5% in extended trading on Wednesday after the tech conglomerate issued second-quarter results that topped Wall Street projections. Here's how the company did in comparison with LSEG consensus: Earnings per share: $2.80 adjusted vs. $2.64 expected $2.80 adjusted vs. $2.64 expected Revenue: $16.98 billion vs. $16.59 billion IBM's revenue increased nearly 8% year over

Meta Touts Even More Protections for Teen Users. Here's What's New

Meta on Wednesday unveiled the latest efforts it's making to bolster the safety of teens and kids on its social media apps. The company has touted these new features for Instagram and Facebook in a blog post, most notably adding more information and warnings about accounts teens might try to contact via direct messages. "We've added new safety features to DMs in Teen Accounts to give teens more context about the accounts they're messaging and help them spot potential scammers," the post explain

Proton launches privacy-respecting encrypted AI assistant Lumo

Proton has launched a new tool called Lumo, offering a privacy-first AI assistant that does not log user conversations and doesn't use their prompts for training. Proton is a Swiss company behind proven privacy and security tools and services, including Proton Mail, Proton VPN, and Proton Drive. In June 2024, it transitioned to a non-profit structure, putting user privacy over profits. The introduction of Lumo aligns with this mission, as Proton claims this AI tool is designed to provide help

FastVLM: Efficient Vision Encoding for Vision Language Models

Vision Language Models (VLMs) enable visual understanding alongside textual inputs. They are typically built by passing visual tokens from a pretrained vision encoder to a pretrained Large Language Model (LLM) through a projection layer. By leveraging the rich visual representations of the vision encoder and the world knowledge and reasoning capabilities of the LLM, VLMs can be useful for a wide range of applications, including accessibility assistants, UI navigation, robotics, and gaming. VLM

How to Watch Germany vs. Spain From Anywhere for Free: Stream UEFA Women's Euro 2025 Semi-Final Soccer

World champions and tournament favorites Spain must overcome eight-time UEFA Women's Euro champions Germany today to claim a place in Sunday's showpiece final. Below, we'll outline the best live TV streaming services to watch this match as it happens, wherever you are in the world, and how to use a VPN if the game isn't available where you are. Today's game marks the first time the Spanish have reached the semi-finals of this tournament since 1997. They struggled to get past hosts Switzerland

4 things Proton's privacy-first AI chatbot Lumo can do - and how to try it

Elyse Betters Picaro / ZDNET Proton, the company responsible for Proton Mail, Proton VPN, and more services, is planning to launch a new AI chatbot called Lumo that aims to preserve your privacy. This new chatbot can do things like summarize documents, create code, and just about anything the other chatbots can do. 1. Stores data locally The difference between Lumo and other chatbots is that Lumo stores all data locally, so you don't have to worry that the company has access to your data. Pro

How to harden your Active Directory against Kerberoasting

Kerberoasting is a common attack targeting Microsoft Active Directory, enabling attackers to compromise service accounts with low risk of detection. Because it manipulates legitimate accounts, it can be highly effective. However, robust password security can keep the criminals at bay. First, what is Kerberoasting? The name comes from ‘Kerberos’, the authentication protocol used in Active Directory, which verifies a user’s identity or that of a computer requesting access to resources. Kerberoas

How to set up and use passkeys across your iPhone, iPad, and Mac

Lance Whitney / Elyse Betters Picaro / ZDNET Passkeys offer a more secure and convenient method of authentication compared with passwords. But they can be challenging to set up and synchronize, especially if you want to use the same ones on a range of devices, such as a mobile phone, tablet, and computer. As one solution, Apple users can save and sync their passkeys across an iPhone, iPad, and Mac. The key here is iCloud Keychain, which can store passkeys as well as passwords. You first set up

Meta updates safety features for teens. More than 600,000 accounts linked to predatory behavior

Facebook and Instagram icons are seen displayed on an iPhone. Meta on Wednesday introduced new safety features for teen users, including enhanced direct messaging protections to prevent "exploitative content." Teens will now see more information about who they're chatting with, like when the Instagram account was created and other safety tips, to spot potential scammers. Teens will also be able to block and report accounts in a single action. "In June alone, they blocked accounts 1 million ti

Meta is adding new safety features to child-focused Instagram accounts run by adults

Meta is adding some of its teen safety features to Instagram accounts featuring children, even if they're ran by adults. While children under 13 years of age aren't allowed to sign up on the social media app, Meta allows adults like parents and managers to run accounts for children and post videos and photos of them. The company says that these accounts are "overwhelmingly used in benign ways," but they're also targeted by predators who leave sexual comments and ask for sexual images in DMs. In

Instagram adds new protections for accounts that primarily feature children

Meta is introducing additional safeguards for Instagram accounts run by adults that primarily feature children, the company announced on Wednesday. These accounts will automatically be placed into the app’s strictest message settings to prevent unwanted messages, and will have the platform’s “Hidden Words” feature enabled to filter offensive comments. The company is also rolling out new safety features for teen accounts. Accounts that will be placed into the new, stricter message settings inclu

Toy company may regret coming for “Sylvanian Drama” TikToker, experts say

A popular account on TikTok and Instagram stopped posting suddenly at the end of last year, hit by a lawsuit after garnering millions of views on funny videos using adorable Calico Critter dolls made for preschoolers to act out dark, cringe-y adult storylines. While millions of followers mourn the so-called "Sylvanian Drama" account's demise, experts told Ars that the creator may have a decent chance at beating the lawsuit. The "Sylvanian Drama" account derived its name from "Sylvanian Familie

CISA and FBI warn of escalating Interlock ransomware attacks

CISA and the FBI warned on Tuesday of increased Interlock ransomware activity targeting businesses and critical infrastructure organizations in double extortion attacks. Today's advisory was jointly authored with the Department of Health and Human Services (HHS) and the Multi-State Information Sharing and Analysis Center (MS-ISAC) and it provides network defenders with indicators of compromise (IOCs) collected during investigations of incidents as recent as June 2025, along with mitigation meas

Any-LLM: A unified API to access any LLM provider

When it comes to using LLMs, it’s not always a question of which model to use: it’s also a matter of choosing who provides the LLM and where it is deployed. Today, we announce the release of any-llm, a Python library that provides a simple unified interface to access the most popular providers. When it comes to using Large Language Models (LLMs), it’s not always a question of which model to use: it’s also a matter of choosing who provides the LLM and where it is deployed. As we’ve written about

How to Watch England vs. Italy From Anywhere for Free: Stream UEFA Women's Euro 2025 Semi-final Soccer

Underdogs Italy stand in the way of defending champions England reaching a second successive Women's Euros final as the two sides clash today for a spot in Sunday's game. Below, we'll outline the best live TV streaming services to use to watch this match as it happens, wherever you are in the world, and how to use a VPN if the game isn't available where you are. The Lionesses staged a dramatic comeback against Sweden in their last 16 clash, battling back from two goals down to eventually preva

Google Chrome for iOS now lets you switch between personal and work accounts

Google The BYOD trend has been a popular way for people to use their own devices at work. But the practice often blurs the line between personal and professional, triggering security risks and other issues. Now, Google has expanded a feature designed to ease and improve the process. On Monday, Google announced that Chrome users on iOS will now be able to switch between their work and personal accounts directly in the browser. This capability has already been available for Chrome desktop and An

Tailscale says Zero Trust is broken, and that might be a good thing

Zero Trust has been a buzzword at every enterprise tech conference for years (only recently being replaced with AI), but Tailscale’s new State of Zero Trust 2025 report makes it clear that most organizations still have no idea what it means or how to do it. They surveyed 1,000 IT, security, and engineering leaders. Only 1% of those surveyed said they’re happy with their current access setup. That stat says a lot about the confusion in the marketplace. Some of my favorite gear eufyCam 2C Upgrade

We have made the decision to not continue paying for BBB accreditation

We have made the conscious choice not to continue paying for accreditation from the Better Business Bureau (BBB). We realize that this may raise questions among our customers, and we want to explain why we made this decision. For years, people have been told to look for BBB accredited businesses, and that it somehow reflects whether a business is on the up and up. What most don’t realize is that businesses PAY to be accredited with the BBB. You do not EARN an accreditation- you buy it. A few m

We Have Made the Decision to Not Continue Paying for BBB Accreditation

We have made the conscious choice not to continue paying for accreditation from the Better Business Bureau (BBB). We realize that this may raise questions among our customers, and we want to explain why we made this decision. For years, people have been told to look for BBB accredited businesses, and that it somehow reflects whether a business is on the up and up. What most don’t realize is that businesses PAY to be accredited with the BBB. You do not EARN an accreditation- you buy it. A few m

Apple Encryption Safe After All? UK Reportedly Plans to Backtrack on Backdoor Demands

Apple's reputation for providing a private and secure experience for people who use its products and services is among the highest in the industry. All that has been under threat this year, as the UK government has asked Apple to provide it with backdoor access to the iCloud accounts not only of British citizens, but of people around the world. But it looks like following pressure from the US, the UK might have decided to reverse course. As reported by the Financial Times on Sunday, the Home Of

FCC to eliminate gigabit speed goal and scrap analysis of broadband prices

The Federal Communications Commission is ditching Biden-era standards for measuring progress toward the goal of universal broadband deployment. The changes will make it easier for the FCC to give the broadband industry a passing grade in an annual progress report. FCC Chairman Brendan Carr's proposal would give the industry a thumbs-up even if it falls short of 100 percent deployment, eliminate a long-term goal of gigabit broadband speeds, and abandon a new effort to track the affordability of

Google adds separate work and personal accounts to Chrome on iOS

Google has introduced new features for Chrome on iOS that help users bifurcate work and personal data by using separate Google accounts. As more employers implement bring your own device (BYOD) policies, employees increasingly access company resources from browsers on their personal devices. Devices connected to a managed Google Workspace are able to leverage these additions. Chrome now supports easy account switching and data separation on iOS, similar to its approach on Android and Chrome for

Chrome will let you switch between personal and work accounts on iOS

is a news editor with over a decade’s experience in journalism. He previously worked at Android Police and Tech Advisor. Google is introducing the option to easily switch between personal and work profiles in its Chrome browser on iOS, with data kept separate between the two. The new option is part of Google’s enterprise software package, and doesn’t allow non-enterprise users to switch freely between two Google accounts in the browser. Companies that adopt Chrome Enterprise can let employees

Chrome for iOS makes it easier to switch between work and personal Google accounts

Google announced Monday that it’s introducing a new feature that lets iOS users easily switch between work and personal Google accounts in Chrome. Previously, iOS users had to completely sign out of a Google account and then log in with another, and repeat this process every time they want to access a different account. “People often use their mobile device for both work and personal tasks, requiring them to sign in and out with different Google accounts,” the company wrote in a blog post. “To

Microsoft hit with SharePoint attack affecting global businesses and governments

A Microsoft store in New York, US, on Friday, Oct. 25, 2024. Microsoft has warned of "active attacks" targeting its SharePoint collaboration software, with security researchers noting that organizations worldwide stand to be affected by the breach. The Cybersecurity and Infrastructure Security Agency said Sunday in a release that the vulnerability provides unauthenticated access to systems and full access to SharePoint content, enabling bad actors to execute code over the network. CISA said t