Latest Tech News

Stay updated with the latest in technology, AI, cybersecurity, and more

Filtered by: cur Clear Filter

US recovers $225 million of crypto stolen in investment scams

The U.S. Department of Justice has seized more than $225 million in cryptocurrency linked to investment fraud and money laundering operations, the largest crypto seizure in the history of the U.S. Secret Service. The state's investigators used blockchain analysis to trace the funds stolen from over 400 victims, which were then laundered through a complex network of cryptocurrency addresses to obscure their origin. "The complaint alleges that the cryptocurrency addresses that held the over $225

Curved-Crease Origami Sculptures

Curved-Crease Sculpture When folded along curved creases, paper shapes itself into a natural equilibrium form. These equilibria are poorly understood, especially for curved creases. We are exploring what shapes are possible in this genre of self-folding origami, with applications to deployable structures, manufacturing, and self-assembly. This transformation of flat paper into swirling surfaces creates sculpture that feels alive. History of Curved Origami Sculpture There is a surprisingly old

Ring Alarm 14-Piece Kit Drops to Black Friday Low, Amazon Clears Stock for Non-Prime Members

When it comes to home security devices, certain items aren’t frequently discounted that deeply. The Ring Alarm 14-piece kit is one of the hard-to-find deals, and today it’s priced about as low as Black Friday last year – something we haven’t witnessed since then. What’s making this deal even better is that, unlike with Prime Day, you don’t need a Prime membership in order to take advantage. Anyone can take this deal, and it’s for the 14-piece set only and not smaller sets. Priced at $330, this

Introduction to the A* Algorithm (2014)

Created 26 May 2014, updated Aug 2014, Feb 2016, Jun 2016, Jun 2020, Jul 2023 Graph search algorithms let us find the shortest path on a map represented as a graph. Move the blob (start point) and cross (end point) to see the shortest path found by the A* Algorithm: A* is one of a family of related graph search algorithms: Breadth First Search[1] explores equally in all directions. Dijkstra’s Algorithm[2] takes into account movement costs. A*[3] explores more towards a single destination. In ad

Nothing says an Essential Space premium tier could be in the cards in the future

In the interview, Pei describes the code we found as “zombie strings” that were left there during development. He adds that in its current form, Essential Space will remain free. However, he doesn’t rule out the possibility of a premium tier being added in the future: So I think that’s what happened, somebody got their hands on an older version of the APK and they decompiled it and saw that there [were] some strings related to charging for Essential Space. That was never in the production softw

DOJ seizes record $225 million in crypto tied to global 'pig butchering' scams

The Justice Department announced Wednesday the largest-ever U.S. seizure of cryptocurrency linked to so-called "pig butchering" scams that have cost victims billions globally. Federal prosecutors filed a civil forfeiture action targeting more than $225 million in cryptocurrency traced to a sprawling web of fraudulent investment platforms. Victims were tricked into believing they were investing in legitimate crypto ventures, only to be scammed by criminal networks often operating overseas. "Thi

Wyze adds major security update to its security cameras after numerous security lapses

Wyze, the Seattle-based tech company that specializes in smart home products and wireless cameras, has released a major security update that it hopes will rebuild some lost trust. The company has been plagued by numerous security failures over the past few years, most notably when an AWS outage led to thousands of users gaining access to recorded videos from other people’s homes. That incident, paired with the company’s history of lackluster responses to security flaws, even led The New York Tim

Microsoft 365 to block file access via legacy auth protocols by default

Microsoft has announced that it will start updating security defaults for all Microsoft 365 tenants in July to block access to SharePoint, OneDrive, and Office files via legacy authentication protocols. These changes will also address application access permissions that can expose organizations to unnecessary security risks. The rollout is set to begin in mid-July 2025, with an estimated completion date by August 2025. Microsoft will enable them by default for all Microsoft 365 tenants, across

ChainLink Phishing: How Trusted Domains Become Threat Vectors

Phishing remains one of cybersecurity’s most enduring threats, not because defenders aren’t evolving, but because attackers are adapting even faster. Today’s most effective campaigns aren’t just built on spoofed emails or shady domains. They exploit something far more insidious: trust in the tools and services we use every day, leading to zero-hour phishing. The Rise of ChainLink Phishing Traditional phishing relied on easily identifiable red flags such as suspicious senders and questionable

Blink’s Newest Outdoor Smart Security Cam (3-Pack) Is Now 62% Off, Practically Free Per Unit

Upgrading your home security system doesn’t have to mean a complicated installation or a subscription you’ll forget about in six months. If you’ve been trying to figure out a way to keep tabs on your front porch, backyard, or garage without spending a fortune, you should consider what Amazon has on offer by way of its security cameras. We’ve found a fantastic deal that you won’t want to skip out on right now, in fact. See at Amazon Right now, you can check Amazon to get a 3-pack of the Blink O

AVG Antivirus Review 2025: Robust Free Version but Middling Premium Plans

CNET’s expert staff reviews and rates dozens of new products and services each month, building on more than a quarter century of expertise. 7.6 / 10 SCORE AVG Antivirus Buy at AVG Score Breakdown Performance 9 /10 Security 7 /10 Customer Support 7 /10 Usability 9 /10 Value 7 /10 Features 7 /10 Pros Robust protection from both online and offline threats Resource-light scans TuneUp makes it easy to improve device performance Variety of safe browsing and anti-tracking tools Cons Data sharing w

Wyze tell us why its security cameras deserve your trust again

In an effort to restore trust in the security of its cameras, smart home brand Wyze has developed VerifiedView — a new layer of protection that embeds your user ID into the metadata of every photo, video, and livestream. Wyze claims the system matches this data to your account before playback, blocking unauthorized access to your footage. “This is a safety net,” Wyze co-founder and CMO Dave Crosby tells The Verge. “On top of doing everything we can to protect users, we’ve built this double chec

Wyze Announces a Major Security Revamp with New Metadata Tricks for Security Cameras

CNET reviewers have been fans of Wyze's security platform and cameras in the past, but in the last couple of years I've pulled back from recommending their affordable cams and similar security devices due to a series of unsettling security breaches that I covered in-depth. Now it's been well over a year, and Wyze's security changes have culminated in a fascinating new safety layer called VerifiedView. Wyze VerifiedView basics Wyze video, photo and streaming content from cams is getting a serio

Wyze says its security cameras deserve your trust again

In an effort to restore trust in the security of its cameras, smart home brand Wyze has developed VerifiedView — a new layer of protection that embeds your user ID into the metadata of every photo, video, and livestream. Wyze claims the system matches this data to your account before playback, blocking unauthorized access to your footage. “This is a safety net,” Wyze co-founder and CMO Dave Crosby tells The Verge. “On top of doing everything we can to protect users, we’ve built this double chec

Best Home Security Cameras of 2025: My Picks for Your Protection

CNET has tested tons of home security cameras over the years, and can help you find the right one for your needs. Chris Monroe/CNET There are hundreds of home security cameras on the market, ranging drastically in price, functionality and quality. With all the options, it can be hard to not become overwhelmed fast, especially when you're considering something as important as your home's safety. After CNET's years of testing home security cameras, I have some tips if you're on the hunt for a new

Introduction to the A* Algorithm

Created 26 May 2014, updated Aug 2014, Feb 2016, Jun 2016, Jun 2020, Jul 2023 Graph search algorithms let us find the shortest path on a map represented as a graph. Move the blob (start point) and cross (end point) to see the shortest path found by the A* Algorithm: A* is one of a family of related graph search algorithms: Breadth First Search[1] explores equally in all directions. Dijkstra’s Algorithm[2] takes into account movement costs. A*[3] explores more towards a single destination. In ad

Cybersecurity takes a big hit in new Trump executive order

Cybersecurity practitioners are voicing concerns over a recent executive order issued by the White House that guts requirements for: securing software the government uses, punishing people who compromise sensitive networks, preparing new encryption schemes that will withstand attacks from quantum computers, and other existing controls. The executive order (EO), issued on June 6, reverses several key cybersecurity orders put in place by President Joe Biden, some as recently as a few days before

Amazon Has No Margin Left on this Wireless Blink Camera, Now 60% Off Just Like Black Friday

Smart technology has made it easier than ever to keep an eye on your property whether you’re at home or away. One of the top names in this field is Blink, a company that belongs to… Amazon itself. The brand is known for its user-friendly wireless cameras and what’s truly impressive is how Amazon sometimes slashes prices so dramatically that it leaves little or no margin for itself. This happens during big sales events like Prime Day or Black Friday, but right now, you can also take advantage of

Anysphere launches a $200-a-month Cursor AI coding subscription

Anysphere launched a new $200-a-month subscription plan for its popular AI coding tool, Cursor, the company announced in a blog post on Monday. The new plan, Ultra, offers users 20x more usage on AI models from OpenAI, Anthropic, Google DeepMind, and xAI compared to the company’s $20-a-month subscription plan, Pro. Anysphere also says Cursor users on the Ultra plan will get priority access to new features. Anysphere CEO Michael Truell said in a blog that the Ultra plan was made possible throug

1Password and AWS join forces to secure AI, cloud environments for the enterprise

Join the event trusted by enterprise leaders for nearly two decades. VB Transform brings together the people building real enterprise AI strategy. Learn more 1Password, the Canadian password management company, announced Monday a strategic collaboration agreement with Amazon Web Services that puts the firm in position to capitalize on surging enterprise demand for security tools designed for artificial intelligence and cloud-native environments. The partnership is a major milestone for 1Passwo

New Anubis ransomware can encrypt and destroy data, making file recovery impossible

WTF?! Being affected by a dangerous ransomware operation is bad enough, but at least you might have a chance to recover your files somehow. A recently discovered ransomware strain is making things even trickier by offering a new wiping option that allows affiliate criminals to completely destroy data after encryption. Security researchers have discovered a new Ransomware-as-a-Service campaign with highly destructive potential. Anubis has only been around for a few months and fortunately, hasn't

Norton Antivirus Review 2025: Solid Value for Fast, Effective Protection

CNET’s expert staff reviews and rates dozens of new products and services each month, building on more than a quarter century of expertise. 8.6 / 10 SCORE Norton Antivirus Buy at Norton Pros Resource-light Fast scans Performance optimization tools Superior VPN Cons No identity theft insurance No online account management/data visualization tools AI-heavy customer support Mediocre phone support Founded in 1982, Norton is one of the oldest digital security companies on the planet, and it’

Best Meat Thermometers for 2025

James Bricknell/CNET The most important part of any thermometer testing is accuracy. We weight this criteria most heavily when compiling entries to the best list, and it is the most scientific of the tests. We use a medical-grade thermometer as our baseline for accuracy and test the meat probe variance to that temperature. Ice water testing Testing the accuracy of a thermometer usually involves a cup, some ice cubes, and water. Due to the nature of water it can be a liquid and a solid at 32F

This Tiny Solar Security 2K Camera Is Now 50% Off, Amazon Is Cutting All Margins to Keep You Safe

Outdoor security cameras can feel like more trouble than they’re worth at times – running wires together, with battery packs that take forever to charge, wrestling with terrible video quality and with monthly subscription fees that shoot up fast. But today, Amazon’s offering a solution that trims all those problems on its head and it’s priced nearly too low to believe: The Eufy Security Cam (S220) is a wireless outdoor security camera with solar power and it is currently discounted by 50%, brin

The WIRED Guide to Protecting Yourself From Government Surveillance

The Trump administration has ordered Immigration and Customs Enforcement agents to carry out sweeping raids, deporting thousands of immigrants, often without due process. It has targeted left-leaning foreign students and entire universities, canceling visas and threatening to withhold federal funding. United States Supreme Court appointments from the previous Trump administration have resulted in decisions that enabled roughly half of US states to severely restrict or ban abortions. And Trump’s

Over 46,000 Grafana instances exposed to account takeover bug

More than 46,000 internet-facing Grafana instances remain unpatched and exposed to a client-side open redirect vulnerability that allows executing a malicious plugin and account takeover. The flaw is tracked as CVE-2025-4123 and impacts multiple versions of the open-source platform used for monitoring and visualizing infrastructure and application metrics. The vulnerability was discovered by bug bounty hunter Alvaro Balada and was addressed in security updates that Grafana Labs released on May

Best Cheap Home Security Systems for 2025: I Found the Real Deals

SwitchBot Not sure how to make up your mind? Here are the most important factors when considering a home security system that will spare your wallet. Pricing and subscriptions Security systems can be opaque when it comes to final pricing. The listed cost is often replaced by constant, rotating discounts which are more representative of the actual cost, and total subscription fees may not be obvious. For our list, we chose DIY companies with upfront pricing models so you can see what you get,

Ruby on Rails Audit Complete

The Open Source Technology Improvement Fund is proud to share the results of our security audit of Ruby on Rails. Ruby on Rails (or “Rails”) is an open source full stack web-application framework. Thanks to the help of X41 D-Sec, GitLab, and the Sovereign Tech Agency, Rails can provide more secure versions of the tools needed for users to create database-backed web applications following the Model-View-Controller pattern. Audit Process: The audit work for this engagement took place over Decemb

Infineon security microcontroller flaw enabled extraction of TPM secret keys

A few months ago, security researcher Thomas Roche presented his fundamental research on secure elements used in the YubiKey 5. The security element is the Infineon SLE78, which contains a proprietary implementation of the Elliptic Curve Digital Signature Algorithm (ECDSA). Using side-channel attacks and a great deal of smart research, the author discovered a vulnerability in Infineon Technologies' cryptographic library and, as a result, was able to extract the ECDSA secret key from the secure