Latest Tech News

Stay updated with the latest in technology, AI, cybersecurity, and more

Filtered by: nf Clear Filter

Collections: Nitpicking Gladiator's Iconic Opening Battle, Part I

This week, we’re going to take a close look at arguably the most famous and recognizable Roman battle sequence in film: the iconic opening battle from Gladiator (2000). Despite being a relatively short sequence (about ten minutes), there’s actually enough to talk about here that we’re going to split it over two weeks, talking about the setup – the battlefield, army composition, equipment and battle plan – this week and then the actual conduct of the battle next week. The iconic opening battle,

Computing’s Top 30: Nirmalya Thakur

From tackling the spread of COVID-19 misinformation on social media to his award-winning research on fall detection and indoor localization for ambient assisted living, Nirmalya Thakur actively engages with issues of critical importance to humans and their well-being. Residing at the intersection of various fields–including big data, HCI, machine learning, and natural language processing–Thakur’s groundbreaking research is fueled by interaction data from daily human activities. Whether those a

Mixed DPI in X11

I'm writing this article because I'm getting tired of repeating the same concepts every time someone makes misinformed statements about the (lack of) support for mixed-DPI configurations in X11. It is my hope that anybody looking for information on the subject may be directed here, to get the facts about the actual possibilities offered by the protocol, avoiding the biased misinformation available from other sources. If you only care about “how to do it”, jump straight to The RANDR way, otherwi

These Three Messaging Apps Are Encrypted, but One Stands Above the Rest

Key points: Most widely used messaging app Uses the same encryption protocol as Signal Collects heaps of your data Free, but owned and operated by Meta WhatsApp is the most popular private messaging app on this list, with about 2 billion monthly users, according to Exploding Topics. Because it's so popular, there's a higher chance that other people you might be chatting with have WhatsApp, and therefore your chats can be encrypted. And if the person you're chatting with doesn't have WhatsAp

'Cyber plague': Experts warn of growing infostealer threat after billions of login details exposed

"Someone, somewhere is having data exfiltrated from their machines as we speak," says Volodymyr Diachenko, co-founder of the cybersecurity consultancy SecurityDiscovery. Cybercriminals have intensified their efforts to steal and sell online passwords, experts warn. The alarm comes after the discovery of online datasets containing billions of exposed account credentials. The 30 datasets comprised a whopping 16 billion login credentials across multiple platforms, including Apple, Google and Face

Getty drops key copyright claims against Stability AI, but UK lawsuit continues

Getty Images dropped its primary claims of copyright infringement against Stability AI on Wednesday at London’s High Court, narrowing one of the most closely watched legal fights over how AI companies use copyrighted content to train their models. The move doesn’t end the case entirely – Getty is still pursuing other claims as well as a separate lawsuit in the U.S. – but it underscores the gray areas surrounding the future of content ownership and usage in the age of generative AI. The developm

Nvidia’s ‘AI Factory’ narrative faces reality check as inference wars expose 70% margins

Join the event trusted by enterprise leaders for nearly two decades. VB Transform brings together the people building real enterprise AI strategy. Learn more The gloves came off at Tuesday at VB Transform 2025 as alternative chip makers directly challenged Nvidia’s dominance narrative during a panel about inference, exposing a fundamental contradiction: How can AI inference be a commoditized “factory” and command 70% gross margins? Jonathan Ross, CEO of Groq, didn’t mince words when discussing

Hundreds of data brokers might be breaking state laws, say privacy advocates

is a news writer who covers the streaming wars, consumer tech, crypto, social media, and much more. Previously, she was a writer and editor at MUO. The Electronic Frontier Foundation (EFF) and a nonprofit privacy rights group have called on several states to investigate why “hundreds” of data brokers haven’t registered with state consumer protection agencies in accordance with local laws. An analysis done in collaboration with Privacy Rights Clearinghouse (PRC) found that many data brokers hav

Information has been permanently deleted, for small values of permanently

As part of a periodic purge of unused online accounts, I deleted my account from a company ten months ago. Let’s call that company Contoso. I received a confirmation that said, “Your personal information and items associated with your account have now been deleted. This action is permanent and cannot be reversed.” Yesterday, I got an email from Contoso informing me that they have updated their Privacy Policy. So I guess their “confirmation” of “permanent” and “irreversible” deletion of my pers

The Bank Secrecy Act is failing everyone. It’s time to rethink financial surveillance.

The US is on the brink of enacting rules for digital assets, with growing bipartisan momentum to modernize our financial system. But amid all the talk about innovation and global competitiveness, one issue has been glaringly absent: financial privacy. As we build the digital infrastructure of the 21st century, we need to talk about not just what’s possible but what’s acceptable. That means confronting the expanding surveillance powers quietly embedded in our financial system, which today can tra

Google Home may soon let you pin weather and AQI data for quick checks (APK teardown)

Rita El Khoury / Android Authority TL;DR An upcoming release of Google Home could soon support Outdoor Weather and Outdoor AQI information in the Favorites tab. Adding the information to the Favorites tab will allow users to quickly control their smart home devices based on current weather conditions. Google recently upgraded the Google Home app with a ton of new features and upgrades, including the ability to set device-specific favorites. All of these work great, but there’s always room for

Snake Venom, Urine, and a Quest to Live Forever: Inside a Biohacking Conference Emboldened by MAHA

I have been to the undying convention. I have been pressurized in a hyperbaric oxygen chamber and bathed in flickering gamma-wave light. I have had my electromagnetic field manipulated. I have taken an IV drip of green liquid that looked nearly radioactive. I have been frozen in a cryochamber (and felt amazing afterward) and baked in a one-man, zippable sauna (I didn’t). I have eaten more consecutive meals of beef than ever in my life, grinding unrefined Kalahari desert salt over the slabs of f

Reading NFC Passport Chips in Linux

For boring and totally not nefarious reasons, I want to read all the data contained in my passport's NFC chip using Linux. After a long and annoying search, I settled on roeften's pypassport. I can now read all the passport information, including biometrics. The NFC chip in a passport is protected by a password. The password is printed on the inside of the physical passport. As well as needing to be physically close to the passport for NFC to work, you also need to be able to see the password.

How a data-processing problem at Lyft became the basis for Eventual

When Eventual founders Sammy Sidhu and Jay Chia were working as software engineers at Lyft’s autonomous vehicle program, they witnessed a brewing data infrastructure problem — one that would only become larger with the rise of AI. Self-driving cars produce a ton of unstructured data from 3D scans and photos to text and audio. There wasn’t a tool for Lyft engineers that could understand and process all of those different types of data at the same time — and all in one place. This left engineers

Study Says U.S. Babies Are Missing a Key Gut Microbe, Fueling Allergy Risk

The prevalence of allergies and other chronic diseases is on the rise, with the number of food allergy cases in the U.S. increasing 50% between 2007 and 2021. These allergies can be life-threatening, and understanding their root cause is more important than ever before. A new study has brought experts closer to doing just that. The findings, published Tuesday, June 24 in the journal Communications Biology, linked the rise of allergies and other chronic conditions such as asthma and eczema to th

How CISOs became the gatekeepers of $309B AI infrastructure spending

Join the event trusted by enterprise leaders for nearly two decades. VB Transform brings together the people building real enterprise AI strategy. Learn more Enterprise AI infrastructure spending is expected to reach $309 billion by 2032. The winners won’t be determined by who has the best models; it’ll come down to who controls the infrastructure layer that makes AI operational at scale. Security vendors are making the most aggressive moves. Palo Alto Networks, CrowdStrike and Cisco each repo

How a data processing problem at Lyft became the basis for Eventual

When Eventual founders Sammy Sidhu and Jay Chia were working as software engineers at Lyft’s autonomous vehicle program, they witnessed a brewing data infrastructure problem — and one that would only become larger with the rise of AI. Self-driving cars produce a ton of unstructured data from 3D scans and photos to text and audio. There wasn’t a tool for Lyft engineers that could understand and process all of those different types of data at the same time — and all in one place. This left engine

SourceHut moves business operations from US to Europe

[PATCH sr.ht-docs v2] Terms of service & privacy updates Export this patch --- v2: rollback the premature removal of compliance with US law Will defer this until we finish shutting down the US business entity entirely. privacy.md | 70 +++++++++++++++++++++++ ------------------------------- terms.md | 68 ++++++++++++++++++++++++++++ ------------------------ 2 files changed, 67 insertions(+), 71 deletions(-) diff --git a/privacy.md b/privacy.md index ab96a1f..ed6eb5c 100644 --- a/privacy.md +++ b

Introducing our esteemed 2024 TCMC Impact Award Recipient

The IEEE Technical Community on Multimedia Computing (TCMC) is dedicated to advancing research and practice in systems that synchronize and process diverse media types—including audio, video, text, and animation—for the effective communication of information. TCMC serves as a key platform for the multimedia computing community, promoting innovation, offering technical guidance on emerging challenges, and supporting professionals through mentorship, recognition, and community engagement. TCMC of

Fairphone 6 is switching to a new design that's even more sustainable

What you need to know Leaked renders reveal a modular design for the Fairphone 6, allowing for easy replacement of components. The Fairphone 6 is expected to feature a new design with flat edges and a distinct neon-themed power button, available in black, white, and green color options. The Fairphone 6 is rumored to launch on June 25th starting at €549, and could include a 6.31-inch pOLED 120Hz display, Snapdragon 7s Gen 3, and a 4415mAh battery. Fairphone is expected to launch its sixth sus

Hawaii Highways

Aloha! Click the dark green buttons on the left for lists of the Interstate, state, and some county highways on the Big Island (Hawaii island), Maui, Lanai and Molokai, Kauai, and Oahu. Go to those lists for detailed information on specific routes, including route numbers, names, termini, mileages, and sometimes historical or other information and/or links to photos and other material elsewhere on this site. Also on the left is a button for detailed guides to Oahu Freeways exits and interchange

Tesla launches robotaxi rides in Austin with big promises and unanswered questions

Tesla has started giving rides in driverless Model Y SUVs in Austin, a decade after CEO Elon Musk began making — and breaking — myriad promises about his company’s ability to launch such a service. The rollout will become the first big test of Musk’s belief that it’s possible to safely deploy fully autonomous vehicles using just cameras and end-to-end AI – an approach that differs from other players in the space like Waymo. On Sunday, numerous videos shared on social media as well as sources i

16 billion passwords leaked across Apple, Google, more: What to know and how to protect yourself

Moor Studio/Getty With so much news about data breaches, you have to be careful not to panic each time you hear of a new one. Take the latest report of a major breach. In the headline for a recent story published by Cybernews, the cybersecurity media outlet said that 16 billion passwords were exposed in a record-breaking data breach, opening access to Facebook, Google, Apple, and any other service imaginable. Sounds scary, right? But reading the story itself paints a different picture. Also:

Tell HN: Beware confidentiality agreements that act as lifetime non competes

Just a note of warning from personal experience. Companies don’t really need non-competes anymore. Some companies take an extremely broad interpretation of IP confidentiality, where they consider doing any work in the industry during your lifetime an inevitable confidentiality violation. They argue it would be impossible for you to work elsewhere in this industry during your entire career without violating confidentiality with the technical and business instincts you bring to that domain. It do

Heard about the 16 billion passwords leak? Here are the facts and how to protect yourself

Moor Studio/Getty With so much news about data breaches, you have to be careful not to panic each time you hear of a new one. Take the latest report of a major breach. In the headline for a recent story published by Cybernews, the cybersecurity media outlet said that 16 billion passwords were exposed in a record-breaking data breach, opening access to Facebook, Google, Apple, and any other service imaginable. Sounds scary, right? But reading the story itself paints a different picture. Also:

28 Years Later is a bleak fever dream with rage pumping through its veins

is a reporter focusing on film, TV, and pop culture. Before The Verge, he wrote about comic books, labor, race, and more at io9 and Gizmodo for almost five years. While it wasn’t the first film to feature fast-moving ghouls, there is no denying how much of an impact 28 Days Later had on modern zombie movies. It was a gripping and nauseating wonder, whose action felt uniquely visceral thanks, in part, to director Danny Boyle’s inspired use of a digital video camera. And there was a gut-wrenching

Why ether ETF inflows have come roaring back from the dead

In this article ETH.CM= Follow your favorite stocks CREATE FREE ACCOUNT Omar Marques | Lightrocket | Getty Images Ether ETFs have finally come to life this year after some started to fear they may be becoming zombie funds. Collectively, the funds tracking the price of spot ether are on pace for their sixth consecutive week of inflows and eight positive week in the last nine, according to SoSoValue. The second largest cryptocurrency has become more attractive to institutions in recent weeks lar

16 billion passwords leaked from Apple, Google, more: Here are the facts and how to protect yourself

Moor Studio/Getty With so much news about data breaches, you have to be careful not to panic each time you hear of a new one. Take the latest report of a major breach. In the headline for a recent story published by Cybernews, the cybersecurity media outlet said that 16 billion passwords were exposed in a record-breaking data breach, opening access to Facebook, Google, Apple, and any other service imaginable. Sounds scary, right? But reading the story itself paints a different picture. Also:

No, the 16 billion credentials leak is not a new data breach

News broke today of a "mother of all breaches," sparking wide media coverage filled with warnings and fear-mongering. However, it appears to be a compilation of previously leaked credentials stolen by infostealers, exposed in data breaches, and via credential stuffing attacks. To be clear, this is not a new data breach, or a breach at all, and the websites involved were not recently compromised to steal these credentials. Instead, these stolen credentials were likely circulating for some time,