Latest Tech News

Stay updated with the latest in technology, AI, cybersecurity, and more

Filtered by: cur Clear Filter

Hundreds of Brother printer models have security flaw that can't be patched

This could allow bad actors to remotely access these devices. A security company has found eight security vulnerabilities that impact hundreds of Brother printer models. The company has released firmware updates to handle seven of these vulnerabilities, but one security flaw cannot be patched. Brother has indicated that it'll fix the remaining issue during the manufacturing process of future printers, which doesn't help current owners. The company recommends that users change the default main

Cursor launches a web app to manage AI coding agents

The company behind Cursor, the viral AI coding editor, launched a web app on Monday that allows users to manage a network of coding agents directly from their browser. The launch marks Cursor’s next big step beyond its integrated development environment (IDE), the core product developers use to access its tools. While Anysphere, the company behind Cursor, initially offered only this AI-powered IDE, the company has made a concerted effort to put its products in more places, and develop more agen

Hikvision Canada ordered to cease operations over security risks

The Canadian government has ordered Hikvision’s subsidiary in the country to cease all operations following a review that determined them to pose a national security risk. The order was forwarded to Hikvision last Friday, and the matter was made public over the weekend by Mélanie Joly, Canada's Minister of Innovation, Science and Industry. “Following a National Security Review under the Investment Canada Act, the Government of Canada has ordered Hikvision Canada Inc. to cease all operations in

Europol helps disrupt $540 million crypto investment fraud ring

Spanish authorities have arrested five individuals in Madrid and the Canary Islands, suspected of laundering $540 million (€460 million) from illegal cryptocurrency investment schemes and defrauding more than 5,000 victims. The law enforcement operation was supported and coordinated by Europol and investigators from Estonia, France, and the U.S. (Homeland Security Investigations – HSI). The investigation into the fraud ring started in 2023 On the day of the arrests a cryptocurrency expert was

Avira Antivirus Review 2025: Effective Software, But Privacy Protection Is Lacking

CNET’s expert staff reviews and rates dozens of new products and services each month, building on more than a quarter century of expertise. 7.2 / 10 SCORE Avira Antivirus Buy at Avira Score Breakdown Performance 8 /10 Security 7 /10 Customer Support 5 /10 Usability 8 /10 Value 7 /10 Features 8 /10 Pros Free version available Performance-improving tools such as the Software Updater for Windows and Junk Cleaner for MacOS Fast, efficient antivirus scans Cons No identity theft features and minim

Hundreds of Brother printer models have an unpatchable security flaw

Serious security flaws have been found in hundreds of Brother printer models that could allow attackers to remotely access devices that are still using default passwords. Eight new vulnerabilities, one of which cannot be fixed by patching the firmware, were discovered in 689 kinds of Brother home and enterprise printers by security company Rapid7. The flaws also impact 59 printer models from Fujifilm, Toshiba, Ricoh, and Konica Minolta, but not every vulnerability is found on every printer mode

ZeroRISC Gets $10M Funding, Says Open-Source Silicon Security Inevitable

//php echo do_shortcode('[responsivevoice_button voice="US English Male" buttontext="Listen to Post"]') ?> There is often skepticism around the concept of open-source silicon, especially when it comes to security, according to Dominic Rizzo, CEO and founder of ZeroRISC. We had a chance to catch up with Rizzo last week as the company announced its latest funding round of $10 million, led by Fontinalis Partners (whose other portfolio companies tackle embedded automotive security, AI transformer

NovaCustom – Framework Laptop alternative focusing on privacy

Privacy and security NovaCustom respects your privacy and focuses on security. We are switching to Dasharo coreboot firmware for our laptops, which is open-source and security-focused. You can find the Dasharo coreboot models here. We do not use Google Analytics. We use Signal and you can reach us via Protonmail. You can buy your laptop with Linux preinstalled. We setup your operating system with the most privacy-friendly settings. Even if we install Windows! Customisation We build your laptop

ICE Rolls Facial Recognition Tools Out to Officers' Phones

WIRED published a shocking investigation this week based on records, including audio recordings, of hundreds of emergency calls from United States Immigration and Customs Enforcement (ICE) detention centers. The calls—which include reports of incidents of staff sexual assaults, suicide attempts, and head injuries—indicate a system inundated by life-threatening incidents, delayed treatment, and overcrowding. In a 6-3 decision on Friday, the US Supreme Court upheld a Texas porn ID law, finding th

How vulnerable is critical infrastructure to cyberattack in the US?

is a senior science reporter covering energy and the environment with more than a decade of experience. She is also the host of Hell or High Water: When Disaster Hits Home , a podcast from Vox Media and Audible Originals. Our water, health, and energy systems are increasingly vulnerable to cyberattack. Now, when tensions escalate — like when the US bombed nuclear facilities in Iran this month — the safety of these systems becomes of paramount concern. If conflict erupts, we can expect it to be

How runtime attacks turn profitable AI into budget black holes

This article is part of VentureBeat’s special issue, “The Real Cost of AI: Performance, Efficiency and ROI at Scale.” Read more from this special issue. AI’s promise is undeniable, but so are its blindsiding security costs at the inference layer. New attacks targeting AI’s operational side are quietly inflating budgets, jeopardizing regulatory compliance and eroding customer trust, all of which threaten the return on investment (ROI) and total cost of ownership of enterprise AI deployments. AI

NordVPN review 2025: Innovative features, a few missteps

Engadget has been testing and reviewing consumer tech since 2004. Our stories may include affiliate links; if you buy something through a link, we may earn a commission. Read more about how we evaluate products . NordVPN is as fast as it claims, but its apps sometimes get in their own way. When we say that NordVPN is a good VPN that's not quite great, it's important to put that in perspective. Building a good VPN is hard, as evidenced by all the shovelware VPNs flooding the market. NordVPN may

Microsoft changes Windows in attempt to prevent next CrowdStrike-style catastrophe

In the summer of 2024, corporate anti-malware provider CrowdStrike pushed a broken update to millions of PCs and servers running some version of Microsoft's Windows software, taking down systems that both companies and consumers relied on for air travel, payments, emergency services, and their morning coffee. It was a huge outage, and it caused days and weeks of pain as the world's permanently beleaguered IT workers brought systems back online, in some cases touching each affected PC individuall

The Windows kernel is about to receive a security-focused redesign after CrowdStrike crash

Why it matters: The kernel space is the core component of a computer operating system, where critical hardware management and device driver code reside in memory. If a kernel-level driver malfunctions, the entire OS can behave erratically – or simply crash and burn with a BSOD. Microsoft has stated that it is working on a significant change to the Windows architecture to help prevent another large-scale incident like the one involving CrowdStrike a year ago. Microsoft is developing a new securi

NordVPN Review 2025: Innovative features, a few missteps

Engadget has been testing and reviewing consumer tech since 2004. Our stories may include affiliate links; if you buy something through a link, we may earn a commission. Read more about how we evaluate products . NordVPN is as fast as it claims, but its apps sometimes get in their own way. When we say that NordVPN is a good VPN that's not quite great, it's important to put that in perspective. Building a good VPN is hard, as evidenced by all the shovelware VPNs flooding the market. NordVPN may

Microsoft is trying to get antivirus software away from the Windows kernel

In the summer of 2024, corporate anti-malware provider Crowdstrike pushed a broken update to millions of PCs and servers running some version of Microsoft's Windows software, taking down systems that both companies and consumers relied on for air travel, payments, emergency services, and their morning coffee. It was a huge outage, and it caused days and weeks of pain as the world's permanently beleaguered IT workers brought systems back online, in some cases touching each affected PC individuall

Denmark clamps down on deepfakes by letting people copyright their own features

In Brief The Danish government is working to change copyright law to give its citizens the right to their own body, facial features, and voice. The landmark law is designed to strengthen protections against the creation and dissemination of deepfakes, reports The Guardian. Denmark’s department of culture still needs to submit a proposal to amend current law, but the agency has already secured cross-party support. “In the bill we agree and are sending an unequivocal message that everybody has

Breakthrough non-toxic method developed to extract gold from e-waste

Forward-looking: A team of Australian researchers has unveiled a breakthrough method for extracting gold that could dramatically reduce the environmental and health hazards long associated with mining and electronic waste recycling. The innovation, developed at Flinders University, offers a safer and more sustainable alternative to the use of toxic chemicals like mercury and cyanide, which have historically dominated the gold recovery industry. Gold, prized for its rarity and versatility, is es

VMware perpetual license holder receives audit letter from Broadcom

After sending cease-and-desist letters to VMware users whose support contracts had expired and who subsequently declined to subscribe to one of Broadcom’s VMware bundles, Broadcom has started the process of conducting audits on former VMware customers. Broadcom stopped selling VMware perpetual licenses in November 2023 in favor of pushing a small number of VMware SKUs that feature multiple VMware offerings. Since Broadcom is forcefully bundling VMware products, the costs associated with running

Engadget Podcast: Reviewing our favorite VPNs and M3GAN 2.0

This week, I chat with Sam Chapman, Engadget’s new security reporter who’s been reviewing VPNs and related products. He dives into what led him to security, the VPNs he likes the most and his thoughts on potential cyberattacks. Additionally, we discuss Microsoft’s latest news around the Windows 10 Extended Security Update, and Devindra explains why M3GAN 2.0 absolutely rules. Credits Host: Devindra Hardawar Guests: Sam Chapman Producer: Ben Ellman Music: Dale North and Terrence O'Brien If

Microsoft rolls out Windows security changes to prevent another CrowdStrike meltdown

Elyse Betters Picaro / ZDNET Last summer's CrowdStrike meltdown was a nightmare for network administrators worldwide, disrupting healthcare systems, cutting off access to banking systems, and grounding aircraft. All in all, the event caused billions of dollars in direct and indirect damages, and it was entirely preventable. Also: How to get Windows 10 extended security updates for free: 2 options In response, Microsoft convened a security summit, bringing together technical experts from Crowd

Microsoft is moving antivirus providers out of the Windows kernel

is a senior editor and author of Notepad , who has been covering all things Microsoft, PC, and tech for over 20 years. It’s been nearly a year since a faulty CrowdStrike update took down 8.5 million Windows-based machines around the world, and Microsoft wants to ensure such a problem never happens again. After holding a summit with security vendors last year, Microsoft is poised to release a private preview of Windows changes that will move antivirus (AV) and endpoint detection and response (ED

Snow - Classic Macintosh emulator

About Snow emulates classic (Motorola 680x0-based) Macintosh computers. It features a graphical user interface to operate the emulated machine and provides extensive debugging capabilities. The aim of this project is to emulate the Macintosh on a hardware-level as much as possible, as opposed to emulators that patch the ROM or intercept system calls. It currently emulates the Macintosh 128K, Macintosh 512K, Macintosh Plus, Macintosh SE, Macintosh Classic and Macintosh II. The emulator is writ

WhatsApp Brings Meta AI-Powered Summaries to the Chats You Missed

Tyler Lacoma Editor / Home Security For more than 10 years Tyler has used his experience in smart home tech to craft how-to guides, explainers, and recommendations for technology of all kinds. From using his home in beautiful Bend, OR as a testing zone for the latest security products to digging into the nuts and bolts of the best data privacy guidelines, Tyler has experience in all aspects of protecting your home and belongings. With a BA in Writing from George Fox and certification in Technic

Primitive Kolmogorov complexity is computable

/ 5 min read This post is mostly AI generated, of course with significant guidance, feedback, iteration and some edits from me. There was little for me to gain writing this myself, but I felt it needed to be written down regardless. Kolmogorov complexity and Solomonoff's theory of inductive inference offer formal, theoretical solutions to measuring complexity and forming predictions. However, both are uncomputable, a fact that is often treated as having significant implications in computabilit

Libxml2's "no security embargoes" policy

Libxml2's "no security embargoes" policy [LWN subscriber-only content] Welcome to LWN.net The following subscription-only content has been made available to you by an LWN subscriber. Thousands of subscribers depend on LWN for the best news from the Linux and free software communities. If you enjoy this article, please consider subscribing to LWN. Thank you for visiting LWN.net! Libxml2, an XML parser and toolkit, is an almost perfect example of the successes and failures of the open-source mov

WhatsApp Brings Meta AI-Powered Summaries to Your Texts

Tyler Lacoma Editor / Home Security For more than 10 years Tyler has used his experience in smart home tech to craft how-to guides, explainers, and recommendations for technology of all kinds. From using his home in beautiful Bend, OR as a testing zone for the latest security products to digging into the nuts and bolts of the best data privacy guidelines, Tyler has experience in all aspects of protecting your home and belongings. With a BA in Writing from George Fox and certification in Technic

Enterprises must rethink IAM as AI agents outnumber humans 10 to 1

Join the event trusted by enterprise leaders for nearly two decades. VB Transform brings together the people building real enterprise AI strategy. Learn more Stolen credentials are responsible for 80% of enterprise breaches. Every major security vendor has converged on the same conclusion: Identity is now the control plane for AI security. Scale alone demands this shift. Enterprises managing 100,000 employees will handle more than one million identities when AI agents enter production. Traditi

Updating to Android 16 gives you 2 useful security features - but you need to enable them

Jack Wallen / Elyse Betters Picaro / ZDNET Google released Android 16 a bit earlier than expected, and although it was missing some crucial features, there are key additions to the platform that go a long way to improve security. This was an important step forward, as the need for improved security grows every year. Without companies like Google, Apple, and others upping the ante on security, the mobile space would wind up the wild west of the technological landscape, with ne'er-do-wells poppi

World Curling tightens sweeping rules, bans firmer broom foams ahead of Olympics

World Curling has tightened its sweeping equipment rules heading into the Olympic season. The move, announced Friday, follows concern over firmer broom foams that many players said gave sweepers too much control. Several high-profile models — including some from Goldline, BalancePlus and Hardline — are now banned. Only brushes with less-firm foam are approved for competition, effective immediately. World Curling said the decision followed extensive consultation with players, manufacturers and