Latest Tech News

Stay updated with the latest in technology, AI, cybersecurity, and more

Filtered by: access Clear Filter

reMarkable’s newest E-Ink writing tablet is a 7.3-inch, $449 handheld slab

Fans of reMarkable's series of notepad-like note-taking E-Ink tablets have something new to get excited about today: a new version of the devices called the reMarkable Paper Pro Move, which takes the features of a typical reMarkable tablet and puts them in a smaller 7.3-inch device that can be carried one-handed and easily slid into a pocket or bag. The Paper Pro Move is available to order now and starts at $449 for a version with reMarkable's standard Marker accessory and no case. Adding a Mar

reMarkable’s newest E-Inkwriting tablet is a 7.3-inch, $449 handheld slab

Fans of reMarkable's series of notepad-like note-taking E-Ink tablets have something new to get excited about today: a new version of the devices called the reMarkable Paper Pro Move, which takes the features of a typical reMarkable tablet and puts them in a smaller 7.3-inch device that can be carried one-handed and easily slid into a pocket or bag. The Paper Pro Move is available to order now and starts at $449 for a version with reMarkable's standard Marker accessory and no case. Adding a Mar

Passkeys and Modern Authentication

Passkeys and Modern Authentication There is an ongoing trend in the industry to move people away from username and password towards passkeys. The intentions here are good, and I would assume that this has a significant net benefit for the average consumer. At the same time, the underlying standard has some peculiarities. These enable behaviors by large corporations, employers, and governments that are worth thinking about. Attestations One potential source of problems here is the attestation

SAP to invest over 20 billion euros in 'sovereign cloud' in boost to Europe's AI ambitions

A person holds a smartphone displaying the logo of SAP, a German multinational software corporation known for its enterprise resource planning solutions. German software giant SAP on Tuesday announced it will invest over 20 billion euros ($23.3 billion) into its sovereign cloud capabilities in Europe over the next 10 years. The company said it was expanding its sovereign cloud offerings to include an infrastructure-as-a-service (IaaS) platform enabling companies to access various computing ser

Zscaler data breach exposes customer info after Salesloft Drift compromise

Cybersecurity company Zscaler warns it suffered a data breach after threat actors gained access to its Salesforce instance and stole customer information, including the contents of support cases. This warning follows the compromise of Salesloft Drift, an AI chat agent that integrates with Salesforce, in which attackers stole OAuth and refresh tokens, enabling them to gain access to customer Salesforce environments and exfiltrate sensitive data. In an advisory, Zscaler says that its Salesforce

Court documents shed new light on UK-Apple row over user data

Court documents shed new light on UK-Apple row over user data 1 hour ago Share Save Graham Fraser Technology Reporter Share Save Getty Images The UK government may have wanted to force Apple to provide it with access to more customer data than previously thought, a court document has indicated. A row erupted between the two after it emerged the Home Office asked the tech giant for the right access to highly encrypted user data stored via a service called Advanced Data Protection (ADP). Now a

UK's demand for Apple backdoor may have been broader than previously thought

The UK's Investigatory Powers Tribunal (IPT) has submitted a new legal filing, suggesting that authorities wanted the iCloud backdoor they're demanding Apple to create to be able to access more data than previously thought. According to the Financial Times, UK's Home Office has also yet to legally withdraw or change its order for Apple to create backdoor access to its users' data. If you'll recall, US Director of National Intelligence Tulsi Gabbard claimed a few days ago that the UK "has agreed

High-severity vulnerability in Passwordstate credential manager. Patch now.

The maker of Passwordstate, an enterprise-grade password manager for storing companies’ most privileged credentials, is urging them to promptly install an update fixing a high-severity vulnerability that hackers can exploit to gain administrative access to their vaults. The authentication bypass allows hackers to create a URL that accesses an emergency access page for Passwordstate. From there, an attacker could pivot to the administrative section of the password manager. A CVE identifier isn’t

Proton offers a new lifeline for when the unexpected happens

TL;DR Proton has rolled out a new feature called Emergency Access. This feature allows paid users to pick five trusted contacts who can gain access to their account in case anything happens. Users can allow their trusted contacts to access their account immediately or after a custom set period of time. We all have crucial information stored in the various apps we use. For instance, you could have an important message sitting in your inbox, logins in your password manager, or financial informa

New iPhone 17 accessory from Apple leaked ahead of event

When leaker Majin Bu showed off clones of alleged TechWoven iPhone 17 case boxes, I noticed the fine print on the box mentioned compatibility with an unannounced accessory called Crossbody Strap. In a new post, Majin Bu has more details about this new iPhone 17 accessory from Apple. iPhone 17 cases will have a new feature iPhone 17 case leaks have surfaced all through August. We’ve learned that Apple will likely include lanyard holes on either side of the bottom of its silicone cases, similar

Colombia joins the list of countries probing Apple over App Store antitrust concerns

From the United States to the United Kingdom, from Brazil to Japan, and in many countries in between, Apple has been facing a series of antitrust probes, particularly over its App Store rules. Now, Colombia is also joining in. Here are the details. Last year, Colombia’s Office for Competition Protection launched a probe into Apple’s App Store rules. In its preliminary conclusion, it said that Apple had “employed abusive strategies that were contrary to free commerce.” Now, as reported by Mobil

HSBC apologises as app and online banking go down

HSBC apologises as app and online banking go down HSBC has apologised after customers were left unable to access online banking or use its app in the UK, preventing some from accessing their accounts. Thousands of people have reported problems on outage-checking site Downdetector since the issues first emerged at 11:00 BST on Wednesday. According to HSBC's service status website, customers can still access their accounts by phone and in-person, and card payments are unaffected. "We're really

Salesloft breached to steal OAuth tokens for Salesforce data-theft attacks

Hackers breached sales automation platform Salesloft to steal OAuth and refresh tokens from its Drift chat agent integration with Salesforce to pivot to customer environments and exfiltrate data. The ShinyHunters extortion group claims responsibility for these additional Salesforce attacks. Salesloft's SalesDrift is a third-party platform that connects the Drift AI chat agent with a Salesforce instance, allowing organizations to sync conversations, leads, and support cases into their CRM. Acc

An illustrated guide to OAuth

OAuth was first introduced in 2007. It was created at Twitter because Twitter wanted a way to allow third-party apps to post tweets on users' behalf. Take a second to imagine designing something like that today. How would you do it? One way would just be to ask the user for their username and password. So you create an unofficial Twitter client, and present the user a login screen that says "log in with Twitter". The user does so, but instead of logging into Twitter, they're actually sending the

Defending against malware persistence techniques with Wazuh

Malware persistence techniques enable attackers to maintain access to compromised endpoints despite system reboots, credential changes, or other disruptions. Common methods include altering configurations, injecting startup code, and hijacking legitimate processes. These approaches ensure the malware or attacker remains active, allowing malicious activities to continue without the need for re-exploitation. In this article, we will examine the nature of malware persistence techniques, their imp

An Illustrated Guide to OAuth

OAuth was first introduced in 2007. It was created at Twitter because Twitter wanted a way to allow third-party apps to post tweets on users' behalf. Take a second to imagine designing something like that today. How would you do it? One way would just be to ask the user for their username and password. So you create an unofficial Twitter client, and present the user a login screen that says "log in with Twitter". The user does so, but instead of logging into Twitter, they're actually sending the

Notion’s offline mode might just make me ditch Obsidian

Dhruv Bhutani / Android Authority Notion is one of my favorite tools. From databases to to-do lists, tracking restaurants I wanted to check out, and so much more, I’ve dabbled in it for years until I finally made the switch to Obsidian. That’s mostly because of Notion’s one fatal flaw. The moment you lose internet, the app effectively becomes useless. The moment you lose internet, the app effectively becomes useless. I’ve learned that the hard way on flights, cafes with rocky Wi-Fi, even when

Germany's Copyright Clearing House now requires courts for website blocks

After more than four years of work, the Copyright Clearing House for the Internet (Clearingstelle Urheberrecht im Internet, CUII), established in 2021, has declared itself "successful in the fight against criminal business models on the Internet." At the same time, it is responding to one of the main points of criticism, namely that a private body imposes restrictions on websites that are sensitive in terms of fundamental rights, largely unchecked and behind closed doors. The procedure is now to

Bluesky blocks Mississippi due to its new age verification law

Users with Mississippi IP addresses can no longer access the Bluesky app. The decentralized social media network has explained in a post that Mississippi's new age verification law for social networks "would fundamentally change" how it operates, and it wouldn't be possible to comply with its small team and limited resources. Bluesky says that while it does follow the UK's Online Safety Act, it works very differently from Mississippi's approach to age verification. In the UK, it's only required

Murky Panda hackers exploit cloud trust to hack downstream customers

A Chinese state-sponsored hacking group known as Murky Panda (Silk Typhoon) exploits trusted relationships in cloud environments to gain initial access to the networks and data of downstream customers. Murky Panda, also known as Silk Typhoon (Microsoft) and Hafnium, is known for targeting government, technology, academic, legal, and professional services organizations in North America. The hacking group, under its numerous names, has been linked to numerous cyberespionage campaigns, including

Join Our Next Livestream: Back to School in the Age of AI

Everyone has a stake in how tech is shaping education today. From the tech moguls and venture capitalists who are starting “microschools” and building ed-tech tools to policymakers who are writing bills to safeguard kids online and teachers who are getting creative about using AI for school. WIRED explored all this and more in our recent back-to-school digital edition, and we're excited to talk about it at our next subscriber-only livestream on Thursday, August 28, at 1 pm ET / 10 am PT / 6 pm

X pulls the ability to like and follow from its developer API’s free tier

In an effort to cut down on abuse and fake engagement, Elon Musk’s X is removing access to two key features of its developer API for those on the free plan. Now, free users will no longer be able to use the API to like posts on behalf of a user, nor follow other users. The company says these changes will help protect X’s platform from “spam, bots, and manipulative activities” that degrade the user experience. Developers on paid plans like the Basic, Pro, or Enterprise tiers will be unaffected.

China’s Great Firewall Mysteriously Severed Connection to the World for an Hour

For about an hour on Wednesday, China appeared to go dark—or at least internet access across the country did. According to an analysis published by the Great Firewall Report, a group that monitors internet censorship efforts in China, something happened in the wee hours of Wednesday morning that resulted in China blocking almost all traffic to TCP port 443, the standard port for HTTPS traffic. Between the hours of 12:34 and 1:48 AM in Beijing, someone was observed “unconditionally injecting for

The Download: Ukraine’s Starlink repair shop, and predicting solar storms

Starlink is absolutely critical to Ukraine’s ability to continue in the fight against Russia. It’s how troops in battle zones stay connected with faraway HQs; it’s how many of the drones essential to Ukraine’s survival hit their targets; it’s even how soldiers stay in touch with spouses and children back home. However, Donald Trump’s fickle foreign policy and reports suggesting Elon Musk might remove Ukraine’s access to the services have cast the technology’s future in the country into doubt.

The Rogue Prince of Persia is officially out for PC and consoles

Ubisoft and Evil Empire's long-awaited The Rogue Prince of Persia is finally out and available for purchase. It's been in early access on Steam for over a year and the developers have made plenty of changes during that time to get the game ready for a general launch. It's available for PC via Steam and the Epic Games Store, Xbox Series X/S and PS5. It's also playable in the cloud by using the Xbox Cloud service, Ubisoft+ and Amazon Luna. Nintendo fans will have to wait a bit longer. The game's

Sony is increasing the price of the PlayStation 5 as new tariffs take hold

Sony will raise the price of PlayStation 5 consoles, the company announced on Wednesday. These changes will be effective as of Thursday, August 21. Citing “a challenging economic environment” — which appears to reference President Trump’s tariffs on imported products — Sony is increasing console prices by about $50. In the U.S., the prices will increase to $549.99 for the PlayStation 5, $499.99 for the PlayStation 5 Digital Edition, and $749.99 for the PlayStation 5 Pro. On July 31, the White H

Nothing Beats Our Editors' Favorite Office Chair, and It’s on Sale Now

Office chairs can be surprisingly expensive, easily breaking $1,000 for a seaworthy seat. The Branch Ergonomic Chair Pro, with a list price of just $500, beat out a number of expensive seats from some very recognizable chair makers to earn the top spot on our office chair roundup. For labor day, Branch is offering 10% off when you use code LABORDAY on the base price of the chair, as well as any accessories you might want to add on, plus free shipping, so you can build the ultimate home office.