Latest Tech News

Stay updated with the latest in technology, AI, cybersecurity, and more

Filtered by: cur Clear Filter

Updating to Android 16 gives you 2 useful security features - but you need to enable them

Jack Wallen / Elyse Betters Picaro / ZDNET Google released Android 16 a bit earlier than expected, and although it was missing some crucial features, there are key additions to the platform that go a long way to improve security. This was an important step forward, as the need for improved security grows every year. Without companies like Google, Apple, and others upping the ante on security, the mobile space would wind up the wild west of the technological landscape, with ne'er-do-wells poppi

World Curling tightens sweeping rules, bans firmer broom foams ahead of Olympics

World Curling has tightened its sweeping equipment rules heading into the Olympic season. The move, announced Friday, follows concern over firmer broom foams that many players said gave sweepers too much control. Several high-profile models — including some from Goldline, BalancePlus and Hardline — are now banned. Only brushes with less-firm foam are approved for competition, effective immediately. World Curling said the decision followed extensive consultation with players, manufacturers and

Microsoft Offers Free Windows 10 Extended Security Updates -- Under One Condition

Microsoft is closing the door on Windows 10 in October 2025, and will be ceasing security support for that operating system unless users pay $30 for a one-year extended security update. On Tuesday, with less than four months on the clock until support expires, Microsoft has added a free option. Users need to turn on cloud backup and connect it to their OneDrive account. The ability to get free updates on Windows 10 is a pretty big deal because it is still the most widely used Windows OS, accoun

Data-recovery firm tests $28, 500GB HDD from Amazon and gets surprising results

Fraudulent or misleading storage devices are, unfortunately, still easy to find via online marketplaces. It's also a common story that someone buys a shockingly cheap storage device from an unknown brand and ends up with a product that doesn’t perform as expected—or at all. With this in mind, data-recovery firm Secure Data Recovery recently bought a 500GB HDD from Amazon (the UnionSine HD2510) for $28 and tested it. The results were better than expected, but there are still reasons to avoid buy

How CISOs became the gatekeepers of $309B AI infrastructure spending

Join the event trusted by enterprise leaders for nearly two decades. VB Transform brings together the people building real enterprise AI strategy. Learn more Enterprise AI infrastructure spending is expected to reach $309 billion by 2032. The winners won’t be determined by who has the best models; it’ll come down to who controls the infrastructure layer that makes AI operational at scale. Security vendors are making the most aggressive moves. Palo Alto Networks, CrowdStrike and Cisco each repo

How Today’s Pentest Models Compare and Why Continuous Wins

As threat actors grow faster, stealthier, and more persistent, the approach to pentesting needs to keep evolving. Traditional, periodic assessments no longer keep up with rapidly changing attack surfaces. Static tests offer a snapshot, but attackers see a live stream. Security testing needs to shift testing models to mirror how real-world attackers operate. At Sprocket Security, our Continuous Penetration Testing (CPT) solution is an always on, always active, and hybrid pentesting model. In th

US House bans WhatsApp from staff devices

In Brief The U.S. House of Representatives’ top official has banned WhatsApp from government-issued devices used by its staff, saying the app poses potential security risks, Reuters reported, citing a memo sent to House staff. “The Office of Cybersecurity has deemed WhatsApp a high risk to users due to the lack of transparency in how it protects user data, absence of stored data encryption, and potential security risks involved with its use,” Reuters reported the memo as saying. The memo inst

2 clever ways Android 16 guards your security - but you need to enable them

Jack Wallen / Elyse Betters Picaro / ZDNET Google released Android 16 a bit earlier than expected, and although it was missing some crucial features, there are key additions to the platform that go a long way to improve security. This was an important step forward, as the need for improved security grows every year. Without companies like Google, Apple, and others upping the ante on security, the mobile space would wind up the wild west of the technological landscape, with ne'er-do-wells poppi

Excalidraw+ Is Now SoC 2 Certified

TL;DR: Our SOC 2 Journey We got tired of endless security questionnaires, so we got SOC 2 certified to make things smoother for everyone. The process: Used Vanta to connect our services and fix compliance gaps Wrote a ton of policies Implemented zero-trust production access Upgraded our tech stack (Nx, Infisical, monitoring, VPN, etc.) Did penetration testing Evaluated all vendors Result: Passed SOC 2 Type I 🎉 In progress: Type II Next: maybe GDPR, maybe ISO 27001 (depends on demand)

Canadian telecom hacked by suspected China state group

Hackers suspected of working on behalf of the Chinese government exploited a maximum-severity vulnerability, which had received a patch 16 months earlier, to compromise a telecommunications provider in Canada, officials from that country and the US said Monday. “The Cyber Centre is aware of malicious cyber activities currently targeting Canadian telecommunications companies,” officials for the center, the Canadian government’s primary cyber security agency, said in a statement. “The responsible

This Linux distro routes all your traffic through the Tor network - and it's my new favorite for privacy

Jack Wallen / Elyse Betters Picaro / ZDNET Privacy has become a keystone for keeping your information safe and preventing third parties from creating consumer profiles that could then be used for targeted marketing... or worse. To that end, there are countless products and services that promise to keep you and your information private. Some work, and some are nothing but snake oil. For me, the best route to privacy goes through Linux and one of the many privacy-focused distributions. Recently

Blink Security Bundle Is 50% Off for Early Prime Day, Includes 7 Cameras and Storage With a MicroSD Card

It’s never been easier or more affordable to keep an eye on your home, both inside and out. Whether you’re heading out of town or just want extra peace of mind while you’re at work, a dependable security camera system can make a world of difference. The problem is, most setups either cost too much up front or require subscriptions to get all the features. And if you’re already paying for the equipment, there’s no way you want to spend more money on a subscription every month, too. Luckily, there

Disabling Intel Graphics Security Mitigation Boosts GPU Compute Performance 20%

While not talked about as much as the Intel CPU security mitigations, Intel graphics security mitigations have added up over time that if disabling Intel graphics security mitigations for their GPU compute stack for OpenCL and Level Zero can yield a 20% performance boost. Ubuntu maker Canonical in cooperation with Intel is preparing to disable these security mitigations in the Ubuntu packages in order to recoup this lost performance.I haven't looked at the Intel graphics security mitigation cost

Israel urges citizens to turn off home cameras as Iran hacks surveillance systems

Cutting corners: As tensions between Israel and Iran escalate, Israeli authorities are urging citizens to take an unusual but crucial step: turn off their home security cameras or change their passwords. The warning comes amid growing evidence that Iran is actively attempting to tap into private surveillance devices across Israel to gather intelligence for military operations. In the aftermath of recent Iranian missile strikes on Tel Aviv, concerns about the vulnerability of internet-connected

Long-Dead NASA Satellite Suddenly Lets Out Epic Blast of Energy

NASA's experimental Relay 2 satellite had been dead in the sky since 1967 — until last summer, when it emitted a super-short and very powerful burst of energy out of nowhere. In an interview with New Scientist, one of the researchers from Australia's Curtin University who discovered the strange pulse coming off the dead communications satellite described his shock at finding the nearby source of that nanosecond-long energy blast. Curtin astronomer Clancy James and his team had been using the A

Scientists Just Found Something Unbelievably Grim About Pollution Generated by AI

Tech companies are hellbent on pushing out ever more advanced artificial intelligence models — but there appears to be a grim cost to that progress. In a new study in the science journal Frontiers in Communication, German researchers found that large language models (LLM) that provide more accurate answers use exponentially more energy — and hence produce more carbon — than their simpler and lower-performing peers. In other words, the findings are a grim sign of things to come for the environme

Debunking NIST's calculation of the Kyber-512 security level (2023)

The cr.yp.to blog 2023.10.03: The inability to count correctly: Debunking NIST's calculation of the Kyber-512 security level. #nist #addition #multiplication #ntru #kyber #fiasco [Sidney Harris cartoon used with permission. Copyright holder: ScienceCartoonsPlus.com.] Quick, what's 240 plus 240? It's 280, right? No, obviously not. 40 plus 40 is 80, and 240 times 240 is 280, but 240 plus 240 is only 241. Take a deep breath and relax. When cryptographers are analyzing the security of cryptogra

Delta Chat is a decentralized and secure messenger app

Delta Chat is a decentralized and secure messenger app 💬 Reliable instant messaging with multi-profile and multi-device support ⚡️ Sign up to secure fast chatmail servers or use classic e-mail servers 🥳 Interactive web apps in chats for gaming and collaboration 🔒 Audited end-to-end encryption safe against network and server attacks 👉 FOSS software, built on Internet Standards, avoiding xkcd927 :) Download Available on mobile and desktop.

Social Security Is Set to Dry Up Even Sooner. That's Why I'm Not Relying on It for Retirement

Getty Images/Zooey Liao/CNET If you're banking on Social Security to fund your retirement, you may want to think twice. A new forecast from the Social Security Administration shows that Social Security trust funds will be depleted by 2034, a year sooner than initially forecast. At this time, you'll only be able to receive 81% of your benefits, reducing the amount you'll get paid. As a personal finance expert who saved enough to retire comfortably at 40, I've worked with dozens of clients to h

Something Big Is Twisting Mercury’s Crust

Mercury has it rough. Not only is it the smallest planet in the solar system, it’s also the closest to our Sun. This unfortunate position has caused Mercury to develop cracks and fractures across its surface, and generate stresses to its crust, a new study has found. Mercury is dry, rugged, and heavily cratered; the planet appears deformed with towering cliffs and ridges, as well as fracture lines that run along its surface. The origin of Mercury’s scars has long been a mystery: How did the pla

Wyze wants to keep prying eyes away from your cameras with this new feature

Wyze Wyze is rolling out a new program to make sure only you can see your home security cameras. In an announcement Tuesday about its new VerifiedView program, Wyze explained that it already uses "strong protections like password requirements, two-factor authentication, cloud security, encryption, tools to detect suspicious logins, and much more." Despite those efforts, though, the company has suffered several high-profile breaches that potentially let people look into strangers' homes. Also:

Can users reset their own passwords without sacrificing security?

Like it or not, passwords aren’t going away anytime soon. While many organizations are exploring passwordless authentication, passwords still serve as the main line of defense for most public-facing online services. That said, they come with a heavy management burden. Gartner estimates that 40% of all service desk calls are tied to password issues like expirations, changes, and resets. Some of these issues (like forgotten passwords, routine expirations, or security-driven updates) are unavoidab

Marvel Just Added a *Fourth* Movie to Its 2028 Plans

Marvel’s been having a pretty quiet time at the box office as of late, as it prepares to head into a new Avengers duology to cap off its latest, up-and-down era in a pretty subdued manner. 2025 may have 3 MCU movies to its name (and a host of TV projects), but after Fantastic Four: First Steps, just four movies will release across 2026 and 2027. But once the dust settles on Secret Wars? Marvel Studios is cranking things back up. Variety reports that Disney has now dated a fourth untitled Marvel

3 more days to fuel your next big move — and save up to $210 on your TechCrunch All Stage pass

The countdown is on — you have just 3 days left to save on your pass to TechCrunch All Stage, happening July 15 in Boston’s SoWa Power Station. After Sunday, June 22 at 11:59 p.m. PT, prices go up, and this opportunity to lock in savings disappears. If you’re a founder looking to scale, a VC hunting for breakout talent, or an operator ready to level up, this one-day founder summit is built to move you forward — with tactical insights, candid conversations, and high-impact networking from start

Low-wage tech support workers become a new gateway for cyberattacks

Editor's take: As businesses increasingly rely on outsourced tech support to cut costs, the risks associated with these operations are coming into sharper focus. The threat is no longer just about technical vulnerabilities; it's about the people behind the screens, and the growing pressure they face from both economic hardship and sophisticated cybercriminals. Hackers are increasingly turning the very systems designed to help customers – outsourced tech support and call centers – into powerful

Microsoft to remove legacy drivers from Windows Update for security boost

Microsoft has announced plans to periodically remove legacy drivers from the Windows Update catalog to mitigate security and compatibility risks. "The rationale behind this initiative is to ensure that we have the optimal set of drivers on Windows Update that cater to a variety of hardware devices across the windows ecosystem, while making sure that Microsoft Windows security posture is not compromised," Microsoft said. "This initiative involves periodic cleanup of drivers from Windows Update,

Low-wage support workers become a new gateway for cyberattacks

Editor's take: As businesses increasingly rely on outsourced tech support to cut costs, the risks associated with these operations are coming into sharper focus. The threat is no longer just about technical vulnerabilities; it's about the people behind the screens, and the growing pressure they face from both economic hardship and sophisticated cybercriminals. Hackers are increasingly turning the very systems designed to help customers – outsourced tech support and call centers – into powerful

Curved-Crease Sculpture

Curved-Crease Sculpture When folded along curved creases, paper shapes itself into a natural equilibrium form. These equilibria are poorly understood, especially for curved creases. We are exploring what shapes are possible in this genre of self-folding origami, with applications to deployable structures, manufacturing, and self-assembly. This transformation of flat paper into swirling surfaces creates sculpture that feels alive. History of Curved Origami Sculpture There is a surprisingly old

Microsoft strengthens Windows 365 Cloud PCs with virtualization-based protection

What just happened? Cloud-based Windows installs are generally more secure than local setups, especially against physical and network attacks targeting endpoint devices. Now, Microsoft is raising the bar further by enhancing security features specifically for Windows 365 Cloud PCs. Microsoft recently announced two security-focused changes to the Windows 365 Cloud PC platform. The subscription-based service will soon disable all user-level file redirections and enable several virtualization-base

Security may not be exciting, but AWS proves it's essential

Editor's take: If I'm being totally honest, it's difficult to get excited about improved security capabilities in the tech world. I know they're incredibly important and absolutely essential to keep everything functional in today's cyberthreat-filled world. But it's kind of like thinking about insurance – not much fun. On top of that, by necessity, security updates need to be released at a rate that's as fast (or even faster) than the latest technological innovations in order to keep bad actors