Latest Tech News

Stay updated with the latest in technology, AI, cybersecurity, and more

Filtered by: et Clear Filter

Ultrasound toothbrush promises painless checks for hidden gum problems

This article has been reviewed according to Science X's editorial process and policies . Editors have highlighted the following attributes while ensuring the content's credibility: The toothbrush-shaped ultrasound transducer (left image) features a small head size (right image), allowing easy access to premolars and molars in the back of the mouth. Credit: Adapted from ACS Sensors 2025, DOI: 10.1021/acssensors.5c00521 When visiting the dentist, you might remember being poked and prodded by a t

To the Postbox

In the middle of March 1931, Virginia Woolf wrote a polite letter to a woman sixteen years her junior. The recipient, a feminist writer named Winifred Holtby, was embarking on a book-length study of Woolf’s work. ‘I should much prefer that the book should be, as you say written impersonally, from material in the British Museum,’ Woolf wrote. ‘My feeling is that when people are alive, so much personality is bound to creep in, that it is better for the critic to keep aloof as far as possible.’ By

LetsEncrypt – Expiration Notification Service Has Ended

Since its inception, Let’s Encrypt has been sending expiration notification emails to subscribers that have provided an email address to us via the ACME API. This service ended on June 4, 2025. The decision to end the service is the result of the following factors: Over the past 10 years more and more of our subscribers have been able to put reliable automation into place for certificate renewal. Providing expiration notification emails means that we have to retain millions of email addresses c

OpenAI reportedly ‘recalibrating’ compensation in response to Meta hires

In Brief With Meta successfully poaching a number of its senior researchers, an OpenAI executive reportedly reassured team members Saturday that company leadership has not “been standing idly by.” “I feel a visceral feeling right now, as if someone has broken into our home and stolen something,” Chief Research Officer Mark Chen wrote in a Slack memo obtained by Wired. In response to what appears to be a Meta hiring spree, Chen said that he, CEO Sam Altman, and other OpenAI leaders have been w

Android 16 will protect users from fake cell towers and potential spying threats

It turns out that your smartphone could be an overlooked vulnerability that puts you at risk of being tracked. To combat this, Google is rolling out a new security feature in Android 16 that will warn users if their device is using a fake or insecure mobile network or if that network requests identifying information about a connected device. However, these features likely won't be available until the next generation of Android devices, as first reported by Android Authority. Since the current A

Show HN: Rust -> WASM, K-Means Color Quantization Crate for Image-to-Pixel-Art

Live UI Try the pixel-art converter instantly at https://gametorch.app/image-to-pixel-art Free forever · no sign-up required · runs 100 % in your browser A tiny Rust → WebAssembly library that turns any raster image into low-color pixel-art. Features K-means palette extraction with user-selectable color count or supply your own palette. supply your own palette. Keeps transparency intact – only opaque pixels are processed. Down-samples to a fixed tile grid (e.g. 64 × 64) using nearest-neig

Modelling API rate limits as diophantine inequalities

modelling API rate limits as diophantine inequalities You're allowed 10 requests per hour. Each task you run makes three attempts: initial call, retry after 10 minutes, and retry after 30 minutes. What’s the maximum number of tasks you can safely run per hour? Most engineers throw exponential backoff at the problem. And it works great in most cases! But can we, for the sake of having fun, be more mathematical about this? In a way, this is just an integer feasibility problem. the setup Let’

Topics: 10 30 retry task window

Must-Play Games of 2025 So Far: Death Stranding 2, Expedition 33, Assassin's Creed Shadows and More

At the start of the year, 2025 was going to be all about Grand Theft Auto 6, which had so much hype that players were already expecting it to win Game of the Year. That changed last month when Rockstar Games announced that its highly anticipated game would be pushed to 2026. Though this year might not have what could be the biggest game of the decade, 2025 so far has some great games from the most unlikely places. With the launch of the Switch 2 and Summer Game Fest already happening in early J

IPv6 reaches majority use in 21 countries as Starlink and other providers modernize global connectivity

What just happened? The number of countries where more than half of internet connections use the IPv6 protocol has surged from 13 to 21 over the past year. This rapid progress, tracked by measurements from organizations such as Akamai, APNIC, Facebook, and Google, highlights both evolution and the growing influence of new connectivity providers, most notably Starlink. The most dramatic transformation has occurred in Tuvalu, a Pacific island nation with a population under 10,000. Until early 202

Let’s Encrypt ends certificate expiry emails to cut costs, boost privacy

Let's Encrypt has announced it will no longer notify users about imminent certificate expirations via email due to high costs, privacy concerns, and unnecessary complexities. The decision to end the expiration notification email service was implemented as of June 4, 2025, but Let's Encrypt has now communicated it via a blog post to raise awareness and prevent unexpected disruptions. Let's Encrypt is a nonprofit Certificate Authority (CA) that provides free, automated, and open digital certific

Cloudflare open-sources Orange Meets with End-to-End encryption

Cloudflare has implemented end-to-end encryption (E2EE) to its video calling app Orange Meets and open-sourced the solution for transparency. The application has been available since last year when the internet giant launched it as a demo for Cloudflare Calls (now Realtime). With the introduction of E2EE and the resolution of various trust and verification issues, users interested in strong cryptographic assurances can explore Orange Meets as a foundation for secure video calling in research o

Bluetooth flaws could let hackers spy through your microphone

Vulnerabilities affecting a Bluetooth chipset present in more than two dozen audio devices from ten vendors can be exploited for eavesdropping or stealing sensitive information. Researchers confirmed that 29 devices from Beyerdynamic, Bose, Sony, Marshall, Jabra, JBL, Jlab, EarisMax, MoerLabs, and Teufel are affected. The list of impacted products includes speakers, earbuds, headphones, and wireless microphones. The security problems could be leveraged to take over a vulnerable product and on

Get a free Samsung Galaxy S25 Plus from T-Mobile with any trade-in - here's how

Kerry Wan/ZDNET Newer phones may be getting more compact, but that doesn't mean there aren't bigger options available. The Samsung Galaxy S25 Plus would be a perfect contender if you need a bigger screen, a great camera system, and the latest mobile AI capabilities. Also: You can use T-Mobile's satellite service for free on any carrier now - here's how T-Mobile is now running an offer where you can get your ludicrously capacious Galaxy S25 Plus for free. All you have to do is trade in a phone

Why Go Rocks for Building a Lua Interpreter

By Roxy Light I recently needed to build a custom Lua interpreter in Go. The exact reasons aren’t important for this blog post, but neither the reference implementation — which I will be referring to as “C Lua” throughout this article — nor the other open source Go Lua intepreters I could find were a good fit for my needs. Building a Lua interpreter ended up being a rather enjoyable months-long side quest. I’ve had a number of folks ask me to write about the experience since these sorts of proj

Implementing fast TCP fingerprinting with eBPF

In this article I want to document my journey implementing fast TCP fingerprinting in a golang webserver, using eBPF. Just to provide some background, TCP fingerprinting is one of the many techniques that can be used to detect unusual or identifying informations about a web request when implementing an anti-bot solution. This has been a hot topic lately, caused by the rising need to scrape the internet for human content to feeed to the LLMs. Implementing such a system offers interesting techn

More on Apple's Trust-Eroding 'F1 the Movie' Wallet Ad

More on Apple’s Trust-Eroding ‘F1 The Movie’ Wallet Ad This is a funny gag from Claude Zeins, but if you think about it, it shows just how destructive Apple’s decision was to send a push notification from the Wallet app promoting F1 The Movie. It’s a fact that no company can inject an ad into your physical wallet. It just can’t happen. So if Apple’s message to users is that they should trust Apple Wallet, and move more of their “shit that goes in your wallet” life from their traditional analog

Beyond the Hook: A Technical Deep Dive into Modern Phishing Methodologies

A technical exploration of modern phishing tactics, from basic HTML pages to advanced MFA-bypassing techniques, with analysis of infrastructure setup and delivery methods used by phishers in 2025. Introduction In 2025, phishing is still the most prevalent kind of cyber attack on the planet. Indeed, 1.2% of the global email traffic is phishing. That's 3.4 billion emails each day, but only a low number results in a compromise since "only" 3% of employees would click on a malicious link. However,

Bloom Filters by Example

Bloom Filters by Example A Bloom filter is a data structure designed to tell you, rapidly and memory-efficiently, whether an element is present in a set. The price paid for this efficiency is that a Bloom filter is a probabilistic data structure: it tells us that the element either definitely is not in the set or may be in the set. The base data structure of a Bloom filter is a Bit Vector. Here's a small one we'll use to demonstrate: Each empty cell in that table represents a bit, and the nu

This Ninja 6-in-1 XL Air Fryer Drops to a New Prime Day Low, and It’s Rated 4.7 out of 5

The Ninja DZ401 Foodi 6-in-1 XL air fryer is the highest-rated air fryer available for purchase on Amazon, with over 37,000 reviews and an impressive 4.7 out of 5 stars. If you need an XL air fryer that can actually do it all, this is the one to buy. Ninja has become the brand of choice when it comes to air fryers, and this inaugural (early) Prime Day discount is open to everyone, not only Prime members. The price of $179, down from the usual $230, is the best deal for 2025 and an opportunity t

Best Internet Providers in Indiana

What's the best internet provider in Indiana? AT&T is CNET's pick of the best internet service provider in Indiana.The provider's fast speeds, free equipment, unlimited data and high customer satisfaction ratings make it our top recommendation. If you want a reliable internet experience with good value and support, you can't go wrong with AT&T. If you're outside the coverage area of AT&T, we recommend Frontier Fiber. It offers high speeds, one of the highest in the state, reaching up to 5,000Mb

Best Internet Providers in Greenville, South Carolina

What is the best internet provider in Greenville, South Carolina? CNET recommends AT&T Fiber as the best overall internet provider in Greenville thanks to its fast, symmetrical speeds, solid pricing and high customer satisfaction. Plans start at $55 a month and go up to $245 for the speedy 5-gig plan. If fiber isn’t available at your address, Spectrum is a strong backup, which also offers the cheapest plan in the area. You’ll also find options like Verizon 5G Home, T-Mobile Home Internet and sa

Olivia Rodrigo at Glastonbury 2025: Livestream Her Headline Festival Set Free From Anywhere

Olivia Rodrigo makes her highly anticipated Glastonbury headline debut today, with the angsty pop star set to close out the festival's final day with a performance on the iconic Pyramid Stage. Below, we'll outline which live TV streaming service will be streaming Saturday's main headline show at Glastonbury, wherever you are in the world. We'll also explain how to use a VPN if you're outside of the UK. Known for blending raw emotion with punk energy, the Californian former Disney child star ha

Student Solves a Long-Standing Problem About the Limits of Addition

The original version of this story appeared in Quanta Magazine. The simplest ideas in mathematics can also be the most perplexing. Take addition. It’s a straightforward operation: One of the first mathematical truths we learn is that 1 plus 1 equals 2. But mathematicians still have many unanswered questions about the kinds of patterns that addition can give rise to. “This is one of the most basic things you can do,” said Benjamin Bedert, a graduate student at the University of Oxford. “Somehow

Meta reportedly hires four more researchers from OpenAI

In Brief Looks like Meta isn’t done poaching talent from OpenAI. Earlier this week, TechCrunch reported that Meta had hired influential OpenAI researcher Trapit Bansal, and according to The Wall Street Journal, it also hired three other researchers from the company. Now The Information is reporting four more Meta hires from OpenAI: Researchers Shengjia Zhao, Jiahui Yu, Shuchao Bi, and Hongyu Ren. This hiring spree comes after the April launch of Meta’s Llama 4 AI models, which reportedly did

5 Kindle accessories every user should have (and why they make such a big difference)

'ZDNET Recommends': What exactly does it mean? ZDNET's recommendations are based on many hours of testing, research, and comparison shopping. We gather data from the best available sources, including vendor and retailer listings as well as other relevant and independent reviews sites. And we pore over customer reviews to find out what matters to real people who already own and use the products and services we’re assessing. When you click through from our site to a retailer and buy a product or

The top 10 laptops our readers are buying this year (no. 1 surprised us)

'ZDNET Recommends': What exactly does it mean? ZDNET's recommendations are based on many hours of testing, research, and comparison shopping. We gather data from the best available sources, including vendor and retailer listings as well as other relevant and independent reviews sites. And we pore over customer reviews to find out what matters to real people who already own and use the products and services we’re assessing. When you click through from our site to a retailer and buy a product or

I Let AI Agents Plan My Vacation—and It Wasn't Terrible

The worst part of travel is the planning: the faff of finding and booking transport, accommodation, restaurant reservations—the list can feel endless. To help, the latest wave of AI agents, such as OpenAI’s Operator and Anthropic’s Computer Use claim they can take these dreary, cumbersome tasks from befuddled travelers and do it all for you. But exactly how good are they are digging out the good stuff? What better way to find out than deciding on a last-minute weekend away. I tasked Operator, w

James Webb Discovers First-Ever Exoplanet by Taking a Picture of It

Okay, that's pretty cool. World's First Scientists harnessing NASA's James Webb Space Telescope took what appears to be the first-ever direct picture of an exoplanet resulting in its discovery, in yet another accomplishment for the mighty space observatory. An international team of astronomers published a paper on the historic finding in the prestigious journal Nature. "If confirmed, this would represent Webb’s first direct image discovery of a planet," they wrote of the finding, "and the li

Show HN: AGL a toy language that compiles to Go

AGL (AnotherGoLang) Description AGL is a language that compiles to Go. It uses Go's syntax, in fact its lexer/parser is a fork of the original Go implementation, with a few modifications The main differences are: Functions return only a single value. This makes it possible to use types like Option[T] and Result[T] , and to support automatic error propagation via an operator. and , and to support automatic error propagation via an operator. To make returning multiple values easy, a Tuple ty

Topics: fmt func int main return

Show HN: Vet – A tool for safely running remote shell scripts

vet Don't just run it — vet it. Stop blindly piping to bash. vet lets you inspect remote scripts for changes, run them through a linter, and require your explicit approval before they can execute. The Problem We've all seen this pattern for installing software: curl -sSL https://example.com/install.sh | bash This is dangerous. The script could be malicious, the server could be compromised, or a transient network error could result in executing a partial script. The Solution vet wraps thi