Latest Tech News

Stay updated with the latest in technology, AI, cybersecurity, and more

Filtered by: cur Clear Filter

A New Geometry for Einstein's Theory of Relativity

Kunzinger and Sämann wanted to use their new way of estimating curvature to determine whether these singularity theorems would still be valid if they no longer assumed space-time is smooth. Would singularities persist even in rougher, more realistic-looking spaces? It’s important to find out if the smoothness condition can be waived, Sämann said, because doing so would bring the theorems closer to physical reality. After all, he added, “we believe non-smoothness is an inescapable part of the nat

When root meets immutable: OpenBSD chflags vs. log tampering

Why ISO 27001 Demands Immutable Logs (Without Actually Saying So) # ISO 27001 is like that careful lawyer who never says exactly what they mean – it tells you what needs to be achieved, not how to do it. When it comes to logging, this is particularly telling: Control A.12.4.2 simply states that “logging information and logging facilities shall be protected against tampering and unauthorized access.” Period. How? That’s your problem to solve. But anyone who’s ever had to investigate a security

Topics: log logs root secure var

Resolve (YC W15) Is Hiring an Operations and Billing Lead for Construction VR

Location: Remote Type: Full-time About Us Resolve is an 11-person SaaS startup helping construction companies and builders review faster. Our clients include general contractors, specialty subcontractors, owner operators and engineering companies—companies that build the world around us. We’re growing fast and looking for a detail-oriented, proactive Billing and Operations Lead to take charge of key administrative processes that keep our business humming. What You’ll Do You’ll own and impro

GrapheneOS makers take a knife to this ‘Google-free’ phone coming to the US

Paul Jones / Android Authority TL;DR The team behind the GrapheneOS platform has criticized the Fairphone Gen 6 for apparent security issues. The team added that the Fairphone model sold in the US lacks “bare minimum” privacy and security protections. Even the standard Fairphone Gen 6 was criticized for delayed software patches and the lack of a secure element. The Fairphone Gen 6 is one of the best Android phones to get if you want a repairable and sustainable smartphone experience. The dev

When Root Meets Immutable: OpenBSD Chflags vs. Log Tampering

Why ISO 27001 Demands Immutable Logs (Without Actually Saying So) # ISO 27001 is like that careful lawyer who never says exactly what they mean – it tells you what needs to be achieved, not how to do it. When it comes to logging, this is particularly telling: Control A.12.4.2 simply states that “logging information and logging facilities shall be protected against tampering and unauthorized access.” Period. How? That’s your problem to solve. But anyone who’s ever had to investigate a security

Topics: log logs root secure var

Microsoft Offers Free Windows 10 Security Updates for Those Who Don't Want to Upgrade to Windows 11

The Windows 10 era is almost at an end. Microsoft is ending support for Windows 10 and stopping security support in October. Initially, Microsoft was offering a one-year extended security update for $30, but we've got some good news: Microsoft has added a free option, allowing you to stick with Windows 10 for another year. However, in order to access it, you'll need to use cloud backup and connect it with your OneDrive account. The ability to get free updates on Windows 10 is a pretty big deal

Linux and Secure Boot certificate expiration

Linux and Secure Boot certificate expiration [LWN subscriber-only content] Welcome to LWN.net The following subscription-only content has been made available to you by an LWN subscriber. Thousands of subscribers depend on LWN for the best news from the Linux and free software communities. If you enjoy this article, please consider subscribing to LWN. Thank you for visiting LWN.net! Linux users who have Secure Boot enabled on their systems knowingly or unknowingly rely on a key from Microsoft t

Poor Passwords Tattle on AI Hiring Bot Maker Paradox.ai

Security researchers recently revealed that the personal information of millions of people who applied for jobs at McDonald’s was exposed after they guessed the password (“123456”) for the fast food chain’s account at Paradox.ai, a company that makes artificial intelligence based hiring chatbots used by many Fortune 500 firms. Paradox.ai said the security oversight was an isolated incident that did not affect its other customers, but recent security breaches involving its employees in Vietnam te

US passes first major national crypto legislation

US passes first major national crypto legislation 43 minutes ago Share Save Natalie Sherman BBC News Share Save Getty Images Lawmakers in the US have passed the country's first major national cryptocurrency legislation. It is a major milestone for the once fringe industry, which has been lobbying Congress over regulation for years and poured millions into last year's election, backing candidates that included Donald Trump. The bill sets up a regulatory regime for so-called stablecoins, a kind

My experience with Claude Code after two weeks of adventures

My Experience With Claude Code After 2 Weeks of Adventures 17 Jul, 2025 Hatching... Cursor Shenanigans Cursor, my beloved, started rate limiting shenanigans a few days back. For a good 2 weeks after June 16, 2025, we had almost infinite API request access. I had a lot of code-related work around this time as I was working on Gumroad bounties plus my AI engineering/LLM eval-related consulting work. Apart from just codegen, I also use these tools to onboard/understand codebases faster and just

My experience with Claude Code after 2 weeks of adventures

My Experience With Claude Code After 2 Weeks of Adventures 17 Jul, 2025 Hatching... Cursor Shenanigans Cursor, my beloved, started rate limiting shenanigans a few days back. For a good 2 weeks after June 16, 2025, we had almost infinite API request access. I had a lot of code-related work around this time as I was working on Gumroad bounties plus my AI engineering/LLM eval-related consulting work. Apart from just codegen, I also use these tools to onboard/understand codebases faster and just

My Experience with Claude Code After 2 Weeks of Adventures

My Experience With Claude Code After 2 Weeks of Adventures 17 Jul, 2025 Hatching... Cursor Shenanigans Cursor, my beloved, started rate limiting shenanigans a few days back. For a good 2 weeks after June 16, 2025, we had almost infinite API request access. I had a lot of code-related work around this time as I was working on Gumroad bounties plus my AI engineering/LLM eval-related consulting work. Apart from just codegen, I also use these tools to onboard/understand codebases faster and just

Confident Security, ‘the Signal for AI,’ comes out of stealth with $4.2M

As consumers, businesses, and governments flock to the promise of cheap, fast, and seemingly magical AI tools, one question keeps getting in the way: How do I keep my data private? Tech giants like OpenAI, Anthropic, xAI, Google, and others are quietly scooping up and retaining user data to improve their models or monitor for safety and security, even in some enterprise contexts where companies assume their information is off limits. For highly regulated industries or companies building on the

I can't go back to grainy night vision after testing this security camera

ZDNET's key takeaways The EufyCam S3 Pro is available separately for $220 or in a two-pack with the HomeBase 3 for $550. This EufyCam is an excellent 4K outdoor security camera that delivers on its night vision promises, features no monthly fees, and has dual motion detection to reduce false alerts. The biggest downsides are that the camera is expensive, especially when you bundle it with HomeBase 3, and its resolution drops to 1080p with HomeKit. $549.99 at Amazon Eufy Security launched a ne

Wttr: Console-oriented weather forecast service

wttr.in — the right way to check curl the weather! wttr.in is a console-oriented weather forecast service that supports various information representation methods like terminal-oriented ANSI-sequences for console HTTP clients (curl, httpie, or wget), HTML for web browsers, or PNG for graphical viewers. Originally started as a small project, a wrapper for wego, intended to demonstrate the power of the console-oriented services, wttr.in became a popular weather reporting service, handling tens o

Samsung fixes the Secure Folder flaw that let anyone see what apps you’re hiding

Mishaal Rahman / Android Authority TL;DR Samsung has patched a Secure Folder flaw that previously allowed anyone with physical access to see your hidden apps and photos. The vulnerability existed because Secure Folder was implemented as a “work profile,” which key system components didn’t recognize as a highly secure space. One UI 8 reclassifies Secure Folder as a “private” profile, ensuring system apps now correctly hide its sensitive files and app information from view. Samsung’s Secure Fo

The Future of Social Security Looks Grim. 6 Tips to Help You Save for Retirement Now

Getty Images/Zooey Liao/CNET Social Security payments can help you fund part of your retirement -- but don't bank on it as your only source of income. The Social Security trust fund is expected to dry up by 2034, according to the Social Security Administration. That's one year sooner than initially forecast. While the fund won't vanish completely, it's estimated that you'll only receive 81% of your benefits, at best. Why? The fund has been running out of money for years, but President Donald

Windows KB5064489 emergency update fixes Azure VM launch issues

Microsoft has released an emergency update to fix a bug that prevents Azure virtual machines from launching when the Trusted Launch setting is disabled and Virtualization-Based Security (VBS) is enabled. The bug impacted Windows Server 2025 and Windows 11 24H2 and was introduced during the July Patch Tuesday security updates. "This update addresses an issue that prevented some virtual machines (VMs) from starting when Virtualization-Based Security (VBS) was enabled," explains Microsoft. "It a

To be a better programmer, write little proofs in your head

This is a brief write-up of a trick I learned that helps me write code faster and more accurately. I say "trick", but it's really something I started to do without noticing as I moved further into my career. When you're working on something difficult, sketch a proof in your head as you go that your code will actually do what you want it to do. A simple idea, but easier said than done: doing this "online" without interrupting your flow takes a lot of practice. But once you get really good at it,

Police disrupt “Diskstation” ransomware gang attacking NAS devices

An international law enforcement action dismantled a Romanian ransomware gang known as 'Diskstation,' which encrypted the systems of several companies in the Lombardy region, paralyzing their businesses. The law enforcement operation codenamed 'Operation Elicius' was coordinated by Europol and also involved police forces in France and Romania. Diskstation is a ransomware operation that targets Synology Network-Attached Storage (NAS) devices, which are commonly used by companies for centralized

Blender 4.5 LTS Released

The final frontier. After years of work, support for the popular backend in Blender is now on par with OpenGL. It’s not enabled by default yet; make it so in the Preferences. Make sure to keep your drivers up to date! Blender works closely with hardware manufacturers to ensure Vulkan performs as good as possible. See the supported platforms and drivers, and the current limitations.

My favorite indoor security camera has no subscription fees

ZDNET's key takeaways The Eufy Security Indoor Cam S350 is available for purchase at $130. The S350 indoor camera features dual telephoto and wide-angle lenses with 360-degree motion tracking and optional local storage to avoid monthly fees. The only drawback I've found is that I wish the camera had a button to engage privacy mode manually, but you can schedule it as needed on the app. View now at Amazon It's safe to say the Eufy Security Indoor Cam S350 has become indispensable in my home. W

Don't Want to Upgrade to Windows 11? Microsoft Offers Free Windows 10 Security Updates

The era of Windows 10 is almost at an end. In October 2025, Microsoft is ending support for Windows 10 and stopping security support. Initially Microsoft was offering a one-year extended security update for $30, but we've got good news. Microsoft has added a free option, allowing you to stick with Windows 10 for another year. However, in order to access it, users will need to use cloud backup and connect it with their OneDrive account. The ability to get free updates on Windows 10 is a pretty b

Anthropic signs a $200mm deal with the Department of Defense

The U.S. Department of Defense (DOD), through its Chief Digital and Artificial Intelligence Office (CDAO), has awarded Anthropic a two-year prototype other transaction agreement with a $200 million ceiling. As part of the agreement, Anthropic will prototype frontier AI capabilities that advance U.S. national security. "This award opens a new chapter in Anthropic’s commitment to supporting U.S. national security, which is where our earliest federal deployments began more than a year ago,” said T

Two new Android 16 security features protect you better - how to switch them on now

JEFF PACHOUD/Getty Images Although Google's earlier-than-expected release of Android 16 was missing a few important features, the updated OS does deliver improved security that every Android user would be well-advised to enable. I'll explain these two key security features and how to find and enable them. Also: Google quietly confirms ChromeOS-Android merger - here's what it means for you 1. Identity Check This feature was added in 2024, but it didn't receive much attention until the releas

Gigabyte motherboards vulnerable to UEFI malware bypassing Secure Boot

Dozens of Gigabyte motherboard models run on UEFI firmware vulnerable to security issues that allow planting bootkit malware that is invisible to the operating system and can survive reinstalls. The vulnerabilities could allow attackers with local or remote admin permissions to execute arbitrary code in System Management Mode (SMM), an environment isolated from the operating system (OS) and with more privileges on the machine. Mechanisms running code below the OS have low-level hardware access

From Bitcoin to XRP: Key cryptocurrency terms and what they mean

From Bitcoin to XRP: Key cryptocurrency terms and what they mean 3 hours ago Share Save Liv McMahon, Joe Tidy & Brandon Drenon BBC News Share Save Getty Images Bitcoin's price reaching a new high of $120,000 (£89,000) - buoyed by US President Donald Trump's crypto-friendly stance - has kept the buzzy world of cryptocurrencies in the spotlight. But it also contains confusing terms such as ETFs, blockchains and cold wallets, that can make the topic somewhat tricky to navigate. Worry not. If you

Discord's virtual Orbs currency is now available for everyone to earn

Discord has begun rolling out its in-app Orbs currency to everyone. In conjunction with the platform's Quest system, users can earn Orbs by watching ads on Discord. You can then use the currency to purchase exclusive drip for your profile, including badges, effects and avatars. It's also possible to exchange Orbs for three-day Nitro credits and anything else you can buy on the Discord Shop. Sometimes developers will also offer the currency in exchange for simply trying out their game, or comple

The North Korean fake IT worker problem is ubiquitous

By now, the North Korean fake IT worker problem is so ubiquitous that if you think you don't have any phony resumes or imposters in your interview queue, you're asleep at the wheel. "Almost every CISO of a Fortune 500 company that I've spoken to — I'll just characterize as dozens that I've spoken to — have admitted that they had a North Korean IT worker problem," said Mandiant Consulting CTO Charles Carmakal during a threat-intel roundtable, admitting that even Mandiant's parent company Google