Latest Tech News

Stay updated with the latest in technology, AI, cybersecurity, and more

Filtered by: ks Clear Filter

Zelle needs to fix ‘significant scams and fraud,’ lawmakers say

is a news writer who covers the streaming wars, consumer tech, crypto, social media, and much more. Previously, she was a writer and editor at MUO. Banks are facing renewed pressure to protect their customers from scams on Zelle, the payment network owned by JPMorgan, Wells Fargo, Bank of America, Capital One, and other big banks. In letters to the banks, Sen. Elizabeth Warren (D-MA), Sen. Richard Blumenthal (D-CT), and Rep. Maxine Waters (D-CA) asked them how often their customers report Zelle

A Group of Young Cybercriminals Poses the ‘Most Imminent Threat’ of Cyberattacks Right Now

Empty grocery store shelves and grounded planes tend to signal a crisis, whether it’s an extreme weather event, public health crisis, or geopolitical emergency. But these scenes of chaos in recent weeks in the United Kingdom, United States, and Canada were caused instead by financially motivated cyberattacks—seemingly perpetrated by a collective of joyriding teens. A notorious cybercriminal group often called Scattered Spider is known for using social engineering techniques to infiltrate target

AT&T rolls out "Wireless Lock" feature to block SIM swap attacks

AT&T has launched a new security feature called "Wireless Lock" that protects customers from SIM swapping attacks by preventing changes to their account information and the porting of phone numbers while the feature is enabled. This new feature has been available for some customers for almost a year and has now been rolled out to all AT&T customers. SIM swap attacks are when cybercriminals port, or move, a targeted phone number to a device under their control. This allows them to intercept the

Best iPad apps to boost productivity and make your life easier

Apple’s iPads come with built-in productivity tools like Notes, Calendar, and Reminders, but if you’d like to explore new ways to maximize productivity and organize your life, there are many apps out there to help you. Although the iPad started off as a device that could be used to stream content or browse the web on the go, Apple has essentially turned its iPads into computers that can handle a variety of different tasks for personal, work, and school use. As a result, there are numerous apps

Topics: app like notes tasks use

10 Best Chromebooks of 2025, Tested and Reviewed

The price for Chromebooks can range wildly, from $150 up to $800, and therefore the specs can also vary. Processor: For the best experience, you should avoid older Chromebooks with Intel Celeron processors. The Chromebook Plus specifications offer a good baseline to guarantee speedy performance, and I’d recommend going with at least an Intel Core i3, Core i5, or AMD Ryzen 3 7000 processor. Just watch out for overspending on configurations with Intel Core i7 processors unless you need the extra

The movie and TV tech we actually want to use

is editor-at-large and Vergecast co-host with over a decade of experience covering consumer tech. Previously, at Protocol, The Wall Street Journal, and Wired. One way to think about the tech industry is just as a series of people trying to build stuff they saw in movies. Ready Player One helped kick of a flood of interest in the metaverse, despite the movie’s deeply dsytopian undertones. If you’ve talked to anyone working in AI, they’ve surely told you about the assistant in Her, despite that m

Show HN: ToplingDB - A Persistent Key-Value Store for External Storage

ToplingDB: A Persistent Key-Value Store for External Storage ToplingDB is developed and maintained by Topling Inc. It is built with RocksDB. See ToplingDB Branch Name Convention. ToplingDB's submodule rockside is the entry point of ToplingDB, see SidePlugin wiki. ToplingDB has much more key features than RocksDB: SidePlugin enables users to write a json(or yaml) to define DB configs Embedded Http Server enables users to view almost all DB info on web, this is a component of SidePlugin Embedd

Claude Code now supports hooks

Customize and extend Claude Code’s behavior by registering shell commands Claude Code hooks are user-defined shell commands that execute at various points in Claude Code’s lifecycle. Hooks provide deterministic control over Claude Code’s behavior, ensuring certain actions always happen rather than relying on the LLM to choose to run them. Example use cases include: Notifications : Customize how you get notified when Claude Code is awaiting your input or permission to run something. : Customi

Google fixes fourth actively exploited Chrome zero-day of 2025

Google has released emergency updates to patch another Chrome zero-day vulnerability exploited in attacks, marking the fourth such flaw fixed since the start of the year. "Google is aware that an exploit for CVE-2025-6554 exists in the wild," the browser vendor said in a security advisoryissued on Monday. "This issue was mitigated on 2025-06-26 by a configuration change pushed out to Stable channel across all platforms." The company fixed the zero-day for users in the Stable Desktop channel, w

Claude Code now supports Hooks

Customize and extend Claude Code’s behavior by registering shell commands Claude Code hooks are user-defined shell commands that execute at various points in Claude Code’s lifecycle. Hooks provide deterministic control over Claude Code’s behavior, ensuring certain actions always happen rather than relying on the LLM to choose to run them. Example use cases include: Notifications : Customize how you get notified when Claude Code is awaiting your input or permission to run something. : Customi

U.S. warns of Iranian cyber threats on critical infrastructure

U.S. cyber agencies, the FBI, and NSA issued an urgent warning today about potential cyberattacks from Iranian-affiliated hackers targeting U.S. critical infrastructure. CISA says there are no indications of an ongoing campaign but urges critical infrastructure organizations and other potential targets to monitor their defense due to the current unrest in the Middle East and cyber attacks previously linked to Iran. In a joint fact sheet, the cyber agencies warn that Defense Industrial Base (DI

Microsoft Defender for Office 365 now blocks email bombing attacks

Microsoft says its Defender for Office 365 cloud-based email security suite will now automatically detect and block email bombing attacks. Defender for Office 365 (formerly known as Office 365 Advanced Threat Protection or Office 365 ATP) protects organizations operating in high-risk industries and dealing with sophisticated threat actors from malicious threats from email messages, links, and collaboration tools. "We're introducing a new detection capability in Microsoft Defender for Office 36

The Book of Shaders (2015)

The Book of Shaders by Patricio Gonzalez Vivo and Jen Lowe This is a gentle step-by-step guide through the abstract and complex universe of Fragment Shaders. Contents About the Authors Patricio Gonzalez Vivo (1982, Buenos Aires, Argentina) is a New York based artist and developer. He explores interstitial spaces between organic and synthetic, analog and digital, individual and collective. In his work he uses code as an expressive language with the intention of developing a better together.

The Book of Shaders

The Book of Shaders by Patricio Gonzalez Vivo and Jen Lowe This is a gentle step-by-step guide through the abstract and complex universe of Fragment Shaders. Contents About the Authors Patricio Gonzalez Vivo (1982, Buenos Aires, Argentina) is a New York based artist and developer. He explores interstitial spaces between organic and synthetic, analog and digital, individual and collective. In his work he uses code as an expressive language with the intention of developing a better together.

Anthropic Shredded Millions of Physical Books to Train its AI

Today in schnozz-smashing on-the-nose metaphors for the AI industry's rapacious destruction of the arts: exactly how Anthropic gathered the data it needed to train its Claude AI model. As Ars Technica reports, the Google-backed startup didn't just crib from millions of copyrighted books, a practice that's ethically and legally fraught on its own. No — it cut the book pages out from their bindings, scanned them to make digital files, then threw away all those millions of pages of the original te

Many ransomware strains will abort if they detect a Russian keyboard installed (2021)

In a Twitter discussion last week on ransomware attacks, KrebsOnSecurity noted that virtually all ransomware strains have a built-in failsafe designed to cover the backsides of the malware purveyors: They simply will not install on a Microsoft Windows computer that already has one of many types of virtual keyboards installed — such as Russian or Ukrainian. So many readers had questions in response to the tweet that I thought it was worth a blog post exploring this one weird cyber defense trick.

The AI Backlash Keeps Growing Stronger

Before Duolingo wiped its videos from TikTok and Instagram in mid-May, social media engagement was one of the language-learning app’s most recognizable qualities. Its green owl mascot had gone viral multiple times and was well known to younger users—a success story other marketers envied. But, when news got out that Duolingo was making the switch to become an “AI-first” company, planning to replace contractors who work on tasks generative AI could automate, public perception of the brand soured

Anthropic's AI Training on Books Is Fair Use, Judge Rules. Authors Are More Worried Than Ever

Claude maker Anthropic's use of copyright-protected books in its AI training process was "exceedingly transformative" and fair use, US senior district judge William Alsup ruled on Monday. It's the first time a judge has decided in favor of an AI company on the issue of fair use, in a significant win for generative AI companies and a blow for creators. Two days later, Meta won part of its fair use case. Fair use is a doctrine that's part of US copyright law. It's a four-part test that, when the

FBI, cybersecurity firms say a prolific hacking crew is now targeting airlines and the transportation sector

The FBI and cybersecurity firms are warning that the prolific hacking group known as Scattered Spider is now targeting airlines and the transportation sector. In a brief statement on Friday shared with TechCrunch, the FBI said it had “recently observed” cyberattacks resembling Scattered Spider to include the airline sector. Executives from Google’s cybersecurity unit Mandiant and Palo Alto Networks’ security research division Unit 42 also said they have witnessed Scattered Spider cyberattacks

DC Comics at Theme Parks Has Had a Bizarre History but ‘Superman’ Could Change That

There’s nostalgia for the Batman movie era at Six Flags as we head toward a new DC Studios era with Superman, On a recent visit to Magic Mountain, I found myself reminiscing fondly about the stunt shows from the ’90s. Both Batman Forever and Batman & Robin were draws as WB movie-inspired attractions for folks who didn’t want to only do roller coasters. The most vivid memory I have is Batman swinging into action and riding in the Batmobile for the explosive, stunt-heavy Magic Mountain version of

Cloudflare blocks largest DDoS attack - here's how to protect yourself

oxygen/Getty Cloudflare is a robust content delivery network (CDN) that specializes in providing protection against distributed denial of service (DDoS) attacks. Last month, Cloudflare blocked the largest DDoS attack in internet history. This assault peaked at a staggering 7.3 terabits per second (Tbps). That's a data deluge, equivalent to streaming nearly 10,000 high-definition movies in under a minute. The attack targeted an unnamed hosting provider using Cloudflare's Magic Transit DDoS pro

Prolific cybercrime gang now targeting airlines and the transportation sector

Cybersecurity firms are warning that the prolific hacking group known as Scattered Spider is now targeting airlines and the transportation sector. Executives from Google’s cybersecurity unit Mandiant and Palo Alto Networks’ security research division Unit 42 say they have observed cyberattacks targeting the aviation industry resembling Scattered Spider. Scattered Spider is a collective of mostly English-speaking hackers, typically teenagers and young adults, who are financially motivated to st

Scattered Spider hackers shift focus to aviation, transportation firms

Hackers associated with "Scattered Spider" tactics have expanded their targeting to the aviation and transportation industries after previously attacking insurance and retail sectors These threat actors have employed a sector-by-sector approach, initially targeting retail companies, such as M&S and Co-op, in the United Kingdom and the United States and subsequently shifting their focus to insurance companies. While the threat actors were not officially named as responsible for insurance sector

Nothing’s Phone 3 Hasn’t Even Launched and It’s Already Pissing People Off

Nothing’s Phone 3 hasn’t officially launched yet, but thanks to what looks like a major leak from Android Headlines, the internet—as it often does—is having some discourse. Just like with Nothing’s incoming Headphone 1, leaks suggest that the company is taking a pretty big swing on the design for its flagship phone, and I’m not sure if that swing is quite connecting. Name a bigger downgrade pic.twitter.com/f3k2SBl69b — Noah Cat (@Cartidise) June 26, 2025 One of the biggest changes is that the

Judge rejects Meta's claim that torrenting is “irrelevant” in AI copyright case

Now that Meta has largely beaten an AI training copyright lawsuit raised by 13 book authors—including comedian Sarah Silverman and Pulitzer Prize-winning author Junot Diaz—the only matter left to settle in that case is whether Meta violated copyright laws by torrenting books used to train Llama models. In an order that partly grants Meta's motion for summary judgment, judge Vince Chhabria confirmed that Meta and the authors would meet on July 11 to "discuss how to proceed on the plaintiffs’ sep

A Wild New Take on ‘Phantom of the Opera’ Is Coming, and No One Has Any Idea What It Is

For the past few months, Phans (The Phantom of the Opera fans) have been following mysterious messages and clue drops around New York City for something called Masquerade. Talk online abounded about the roses left in Times Square or the red envelope letters signed by “the Opera Ghost” for the faithful, as a viral campaign teased that something was coming in the realm of immersive theater. As a big Phan and immersive theater nerd, I’ve waited from the far wings on the West Coast with major FOMO f

Judge: Pirate libraries may have profited from Meta torrenting 80TB of books

Now that Meta has largely beaten an AI training copyright lawsuit raised by 13 book authors—including comedian Sarah Silverman and Pulitzer Prize-winning author Junot Diaz—the only matter left to settle in that case is whether Meta violated copyright laws by torrenting books used to train Llama models. In an order that partly grants Meta's motion for summary judgment, judge Vince Chhabria confirmed that Meta and the authors would meet on July 11 to "discuss how to proceed on the plaintiffs’ sep

Judge rejects Meta’s claim that torrenting is “irrelevant” in AI copyright case

Now that Meta has largely beaten an AI training copyright lawsuit raised by 13 book authors—including comedian Sarah Silverman and Pulitzer Prize-winning author Junot Diaz—the only matter left to settle in that case is whether Meta violated copyright laws by torrenting books used to train Llama models. In an order that partly grants Meta's motion for summary judgment, judge Vince Chhabria confirmed that Meta and the authors would meet on July 11 to "discuss how to proceed on the plaintiffs’ sep

Ancient Rocks in Canada Are Almost as Old as the Earth Itself

Due to the movement of Earth’s tectonic plates, our planet’s crust is constantly recycled, making rocks and minerals from its earliest days incredibly rare. That’s frustrating for geologists, since surface-level Hadean rocks (rocks older than 4.03 billion years) could provide significant insight into the first geological stages of Earth’s 4.5-billion-year history. In a study published today in Early Earth, researchers from Canada and France suggest that the Nuvvuagittuq Greenstone Belt (NGB)—a

Homeland Security warns of Iran-backed cyberattacks targeting US networks

In Brief A bulletin issued Sunday by U.S. Homeland Security said it expects to see Iranian government-backed hackers conduct attacks against U.S. networks, amid the ongoing conflict between the U.S. and Israel, and Iran. The National Terrorism Advisory System bulletin said low-level cyberattacks by hacktivists are “likely,” adding that hacktivists and government-linked hackers “routinely target” poorly secured U.S. networks and internet-connected devices to cause disruption. The bulletin was