Latest Tech News

Stay updated with the latest in technology, AI, cybersecurity, and more

Filtered by: ack Clear Filter

Newly Discovered ‘Infinity Galaxy’ Could Prove How Ancient Supermassive Black Holes Formed

A team of astronomers have discovered a curious figure in the universe. It is two distant galaxies colliding with each other to form a larger structure. From Earth’s perspective, the junction of the disks resembles the number eight lying down, similar to the infinity symbol (∞). Because of this resemblance, the researchers—who are based at the universities of Yale and Copenhagen—have nicknamed it the “Infinity Galaxy” and have detailed their discovery in a paper published in the Astrophysical J

Google Maps just made controlling your music a navigation nightmare (Updated: Working on a fix)

Ryan Haines / Android Authority TL;DR Google Maps v25.28 stable and v25.29 beta have removed in-app media playback controls. The removed feature allowed easy access to play, browse suggestions, or open the default music app. The functionality still exists on iOS, and Google has confirmed through a statement that this is a bug whose fix is being worked upon. Update, July 22, 2025 (02:44 AM ET): A Google spokesperson has shared the following statement for this issue: We’re actively working to

Apple Encryption Safe After All? UK Reportedly Plans to Backtrack on Backdoor Demands

Apple's reputation for providing a private and secure experience for people who use its products and services is among the highest in the industry. All that has been under threat this year, as the UK government has asked Apple to provide it with backdoor access to the iCloud accounts not only of British citizens, but of people around the world. But it looks like following pressure from the US, the UK might have decided to reverse course. As reported by the Financial Times on Sunday, the Home Of

Hackers exploiting SharePoint zero-day seen targeting government agencies

The hackers behind the initial wave of attacks exploiting a zero-day in Microsoft SharePoint servers have so far primarily targeted government organizations, according to researchers as well as news reports. Over the weekend U.S. cybersecurity agency CISA published an alert, warning that hackers were exploiting a previously unknown bug — known as a “zero-day” — in Microsoft’s enterprise data management product SharePoint. While it’s still early to draw definitive conclusions, it appears that th

TrackWeight: Turn your MacBook's trackpad into a digital weighing scale

TrackWeight Turn your MacBook's trackpad into a precise digital weighing scale TrackWeight is a macOS application that transforms your MacBook's trackpad into an accurate weighing scale by leveraging the Force Touch pressure sensors built into modern MacBook trackpads. IMG_7303.mov To use it yourself: Open the scale Rest your finger on the trackpad While maintaining finger contact, put your object on the trackpad Try to put as little pressure on the trackpad while still maintaining contact.

Using MacBook's trackpad as digital weighing scale

TrackWeight Turn your MacBook's trackpad into a precise digital weighing scale TrackWeight is a macOS application that transforms your MacBook's trackpad into an accurate weighing scale by leveraging the Force Touch pressure sensors built into modern MacBook trackpads. IMG_7303.mov To use it yourself: Open the scale Rest your finger on the trackpad While mainting finger contact, put your object on the trackpad Try and put as little pressure on the trackpad while still maintaining contact. T

This ‘violently racist’ hacker claims to be the source of The New York Times’ Mamdani scoop

is a reporter who writes about tech, money, and human behavior. She joined The Verge in 2014 as science editor. Previously, she was a reporter at Bloomberg. The ultimate source for The New York Times’ story about Zohran Mamdani’s college application is an open secret. It’s an anime-loving neo-Nazi whose hobbies include furry drawings, posting fan art of a video game character, and hacking universities. On X, the alleged hacker is followed by New York Times freelancer Benjamin Ryan, who was the

Installing apps on Linux? 4 ways it's different than any other OS - and mistakes to avoid

Elyse Betters Picaro / ZDNET When I first started using Linux in the late 90s, there was really only one way to install an application. You would download the app, unpack the archive, run the ./configure command, build the app with make, and then install it with make install. Inevitably, when you ran through that course, you would stumble because of dependencies and have to locate the dependency, run through the same process as you just did (only with the new software), and then find out the ne

T-Mobile is bringing low-latency tech to 5G for the first time

is a news editor covering technology, gaming, and more. He joined The Verge in 2019 after nearly two years at Techmeme. Over the next few weeks, T-Mobile is expanding support for the L4S standard, which stands for “Low Latency, Low Loss, Scalable Throughput.” The technology helps high-priority internet packets move along with fewer delays, to make video calls and cloud games feel smoother and reduce annoying hitches. Users won’t need a special phone or plan to take advantage of the benefits fr

Microsoft Sharepoint server vulnerability puts an estimated 10,000 organizations at risk

A major zero-day security vulnerability in Microsoft's widely used SharePoint server software has been exploited by hackers, causing chaos within businesses and government agencies, multiple outlets have reported. Microsoft announced that it had released a new security patch "to mitigate active attacks targeting on-premises [and not online] servers," but the breach has already effected universities, energy companies, federal and state agencies and telecommunications firms. The SharePoint flaw i

New zero-day bug in Microsoft SharePoint under widespread attack

The U.S. federal government and cybersecurity researchers say a newly discovered security bug found in Microsoft’s SharePoint is under attack. U.S. cybersecurity agency CISA sounded the alarm this weekend that hackers were actively exploiting the bug. Microsoft has not yet provided patches for all affected SharePoint versions, leaving customers across the world largely unable to defend against the ongoing intrusions. Microsoft said the bug, known officially as CVE-2025-53771, affects versions

Google Maps just made controlling your music a navigation nightmare

Ryan Haines / Android Authority TL;DR Google Maps v25.28 stable and v25.29 beta have removed in-app media playback controls. The removed feature allowed easy access to play, browse suggestions, or open the default music app. It’s unclear if the removal was intentional or just a bug, as the functionality still exists on iOS. Google Maps remains one of the best apps for Android devices, but it’s not perfect. There are plenty of ways Google can improve the Maps experience, and a good starting s

10,000+ companies at risk from Microsoft Sharepoint security flaw

More than 10,000 organizations around the world are at risk from hackers after a serious security flaw was discovered in Microsoft’s popular Sharepoint platform, used to store and share confidential documents. The majority of companies at risk are said to be in the US … Microsoft said that there were “active attacks targeting on-premises servers.” US federal and state agencies are among the organizations said to have been affected. Security researchers cited by Bloomberg said that the vulnerab

Learn 14 Languages from Babbel with this exclusive StackSocial deal

Learning a new language doesn’t have to mean night classes, bulky textbooks, or boring apps. With Babbel, you can pick up real-world conversation skills through short, fun, and practical lessons. And right now, you can get a lifetime subscription for only $159 (regularly $599). Why Babbel? Babbel gives you lifetime access to lessons in 14 languages, including French Spanish German Italian Portuguese Swedish Turkish And that’s just a small sample. You’re not limited to just one either,

Over 1,000 CrushFTP servers exposed to ongoing hijack attacks

Over 1,000 CrushFTP instances currently exposed online are vulnerable to hijack attacks that exploit a critical security bug, providing admin access to the web interface. The security vulnerability (CVE-2025-54309) is due to mishandled AS2 validation and impacts all CrushFTP versions below 10.8.5 and 11.3.4_23. The vendor tagged the flaw as actively exploited in the wild on July 19th, noting that attacks may have begun earlier, although it has yet to find evidence to confirm this. "July 18th,

There's Neuralink—and There's the Mind-Reading Company That Might Surpass It

Mark Jackson is playing a computer game with his mind. As he reclines in bed, three blue circles appear on a laptop screen a few feet away. One turns red: the target. Jackson is in control of a white circle, which he needs to steer into the target without running into the blue obstacles. The game is a bit like Pac-Man. Except instead of a joystick, Jackson uses his thoughts to control his little white circle. To move left, he thinks about clenching his right fist once. To move right, he thinks a

Microsoft SharePoint servers are under attack because of a major security flaw

Hackers have exploited vulnerabilities in Microsoft’s SharePoint software, placing tens of thousands of on-premises servers used by global businesses and agencies at risk. Microsoft issued an alert on Saturday disclosing that it was aware of “active attacks,” and that it was working to patch the zero-day exploit. Researchers at Eye Security first identified the vulnerability on July 18th, which allows hackers to access certain on-premises versions of SharePoint and steal keys that can let them

The best colors we’ve seen on Google Pixel phones

Ryan Haines / Android Authority Google will finally launch the Pixel 10 series next month, and leakers have apparently already revealed all the colors. These shades include Obsidian and Porcelain, with Lemongrass and Indigo adding a much-needed splash of color. So we thought now would be a good time to choose our favorite Google Pixel phone colors ever. I asked the Android Authority team to choose their favorite shades, tallied their choices, and created this list. Do note that we excluded the

I Tried This $40 Smartwatch: It Was Meh, but Not a Complete Waste of Time

I wasn't expecting much when I first strapped the WITHit Giga Smartwatch onto my wrist, and at least it delivered on that. This $40 smartwatch does the basics: shows notifications, counts your steps, tracks your heart rate (sort of) and lets you take calls from your wrist. But the execution of all these features is where it all starts to fall apart, and I found myself getting exactly what I paid for. After spending a week testing it, I came away with this: If you just want a basic smartwatch th

Piano Keys

Piano Keys If you've ever looked closely at a piano keyboard you may have noticed that the widths of the white keys are not all the same at the back ends (where they pass between the black keys). Of course, if you think about it for a minute, it's clear they couldn't possibly all be the same width, assuming the black keys are all identical (with non-zero width) and the white keys all have equal widths at the front ends, because the only simultaneous solution of 3W=3w+2b and 4W=4w+3b is with b=0

Make Your Own Backup System – Part 1: Strategy Before Scripts

Backup: Beyond the Simple Copy For as long as I can remember, backup is something that has been underestimated by far too many people. Between flawed techniques, "Schrödinger's backups" (i.e., never tested, thus both valid and invalid at the same time), and conceptual errors about what they are and how they work (RAID is not a backup!), too much data has been lost due to deficiencies in this area. Nowadays, backup is often an afterthought. Many rely entirely on "the cloud" without ever asking

Best Squat Racks of 2025

Choose a squat rack that fits your needs: "Focus your time and energy researching those racks that fit perfectly into your space and for the height of the people who will be using the rack," said Steve Stonehouse, VP of education and programming at Body Fit Training. You'll also want to check the quality of the machine. "There is a different quality and standard for commercial racks as opposed to personal racks," he explains. When deciding on the quality of the rack, something to consider is the

Bizarre "Infinity Galaxy" Could Hold the Secrets of Supermassive Black Holes

Astronomers using data collected by the James Webb Space Telescope have discovered a spectacular cosmic object they're calling the "Infinity Galaxy." The site of an epic head-on collision between two galaxies, it could harbor the secrets to how the heaviest black holes in the universe, the supermassive black holes found at the hearts of galaxies, are born and reach their unbelievable masses — masses extreme enough to organize trillions of stars around them. "Everything is unusual about this ga

A 14kb page can load much faster than a 15kb page (2022)

Why your website should be under 14kB in size Why your website should be under 14kB in size Having a smaller website makes it load faster — that's not surprising. What is surprising is that a 14kB page can load much faster than a 15kB page — maybe 612ms faster — while the difference between a 15kB and a 16kB page is trivial. This is because of the TCP slow start algorithm. This article will cover what that is, how it works, and why you should care. But first we'll quickly go over some of the

Why your website should be under 14kB in size

Why your website should be under 14kB in size Why your website should be under 14kB in size Having a smaller website makes it load faster — that's not surprising. What is surprising is that a 14kB page can load much faster than a 15kB page — maybe 612ms faster — while the difference between a 15kB and a 16kB page is trivial. This is because of the TCP slow start algorithm. This article will cover what that is, how it works, and why you should care. But first we'll quickly go over some of the

Debcraft – Easiest way to modify and build Debian packages

Debian packaging is notoriously hard. Far too many new contributors give up while trying, and many long-time contributors leave due to burnout from having to do too many thankless maintenance tasks. Some just skip testing their changes properly because it feels like too much toil. Debcraft is my attempt to solve this by automating all the boring stuff, and making it easier to learn the correct practices and helping new and old packagers better track changes in both source code and build artifac

Why AI is moving from chatbots to the browser

Happy Friday. I’m back from vacation and still getting caught up on everything I missed. AI researchers moving jobs is getting covered like NBA trades now, apparently. Before I get into this week’s issue, I want to make sure you check out my interview with Perplexity CEO Aravind Srinivas on Decoder this week. It’s a good deep dive on the main topic of today’s newsletter. Keep reading for a scoop on Substack and more from this week in AI news. From chatbots to browsers So far, when most people

Arch Linux pulls AUR packages that installed Chaos RAT malware

Arch Linux has pulled three malicious packages uploaded to the Arch User Repository (AUR) were used to install the CHAOS remote access trojan (RAT) on Linux devices. The packages were named "librewolf-fix-bin", "firefox-patch-bin", and "zen-browser-patched-bin," and were uploaded by the same user, "danikpapas," on July 16. The packages were removed two days later by the Arch Linux team after being flagged as malicious by the community. "On the 16th of July, at around 8pm UTC+2, a malicious AU

Phishers have found a way to downgrade—not bypass—FIDO MFA

Researchers recently reported encountering a phishing attack in the wild that bypasses a multifactor authentication scheme based on FIDO (Fast Identity Online), the industry-wide standard being adopted by thousands of sites and enterprises. If true, the attack, reported in a blog post Thursday by security firm Expel, would be huge news, since FIDO is widely regarded as being immune to credential phishing attacks. After analyzing the Expel write-up, I’m confident that the attack doesn’t bypass F

The investor behind Opendoor's 190% run nearly shut down his fund

In this article OPEN Follow your favorite stocks CREATE FREE ACCOUNT Courtesy: Opendoor On June 6, online real estate service Opendoor was so desperate to get its beaten-down stock price back over $1 and stay listed on the Nasdaq that management proposed a reverse split, potentially lifting the price of each share by as much as 50 times. The stock inched its way up over the next five weeks. Then Eric Jackson started cheerleading. Jackson, a hedge fund manager who was bullish on Opendoor years