Latest Tech News

Stay updated with the latest in technology, AI, cybersecurity, and more

Filtered by: sec Clear Filter

The North Korean fake IT worker problem is ubiquitous

By now, the North Korean fake IT worker problem is so ubiquitous that if you think you don't have any phony resumes or imposters in your interview queue, you're asleep at the wheel. "Almost every CISO of a Fortune 500 company that I've spoken to — I'll just characterize as dozens that I've spoken to — have admitted that they had a North Korean IT worker problem," said Mandiant Consulting CTO Charles Carmakal during a threat-intel roundtable, admitting that even Mandiant's parent company Google

Jack Dorsey’s New App Just Hit a Very Embarrassing Snag

Serial entrepreneur Jack Dorsey, who cofounded Twitter, Block, and Bluesky, has started yet another new app — and this one's got an embarrassing secret. As TechCrunch reports, Dorsey's new open source messaging app, Bitchat, is supposed to be decentralized, private, and secure. There's only one problem: the Bluetooth-based app, by the venture's admission, is probably lacking in that key regard. "This software has not received external security review and may contain vulnerabilities and does n

Download All of Netflix in One Second? Researchers in Japan Just Broke the Internet Speed Record

What if you could download Netflix’s entire library in under a second? How about every English language page on Wikipedia (including all revisions) five times over? That’s the dream that scientists with Japan’s National Institute of Information and Communications Technology have made a reality, achieving a world record in data transmission speed of 1.02 Petabits per second over 1,123 miles -- roughly the distance between Miami and Cleveland. To put that in perspective, we usually measure inter

Apple TV+ docuseries scores 6 Daytime Emmy Awards nominations

Apple has picked up six Daytime Emmy nominations for one of its most interesting nature docuseries, produced in partnership with the BBC Studios Natural History Unit. See the categories and watch the trailer below. Winners will be announced this October Today, the Television Academy announced the nominees for the 52nd Daytime Emmy Awards. The winners will be revealed on October 17, a little more than a month after the 77th Primetime Emmy Awards, which will take place on September 14. Among th

CISA warns hackers are actively exploiting critical ‘Citrix Bleed 2’ security flaw

U.S. cybersecurity agency CISA says hackers are actively exploiting a critical-rated security flaw in a widely used Citrix product, and has given other federal government departments just one day to patch their systems. Security researchers have dubbed the bug “Citrix Bleed 2” for its similarity to a 2023 security flaw in Citrix NetScaler, a networking product that large companies and governments rely on for allowing their staff to remotely access apps and other resources on their internal netw

CISA confirms hackers are actively exploiting critical ‘Citrix Bleed 2’ bug

U.S. cybersecurity agency CISA says hackers are actively exploiting a critical-rated security flaw in a widely used Citrix product, and has given other federal government departments just one day to patch their systems. Security researchers have dubbed the bug “Citrix Bleed 2” for its similarity to a 2023 security flaw in Citrix NetScaler, a networking product that large companies and governments rely on for allowing their staff to remotely access apps and other resources on their internal netw

Security Bite: Fake iPhone virus pop-ups have made it on YouTube

9to5Mac Security Bite is exclusively brought to you by Mosyle, the only Apple Unified Platform. Making Apple devices work-ready and enterprise-safe is all we do. Our unique integrated approach to management and security combines state-of-the-art Apple-specific security solutions for fully automated Hardening & Compliance, Next Generation EDR, AI-powered Zero Trust, and exclusive Privilege Management with the most powerful and modern Apple MDM on the market. The result is a totally automated Appl

My favorite indoor security camera has no subscription fees and is 39% off for Prime Day

ZDNET's key takeaways The Eufy Security Indoor Cam S350 is available for purchase at $130. The S350 indoor camera features dual telephoto and wide-angle lenses with 360-degree motion tracking and optional local storage to avoid monthly fees. The only drawback I've found is that I wish the camera had a button to engage privacy mode manually, but you can schedule it as needed on the app. View now at Amazon The Eufy Security Indoor Cam S350 has no subscription fees and all the privacy settings y

AI chatbot’s simple ‘123456’ password risked exposing personal data of millions of McDonald’s job applicants

In Brief Security researchers found that they could access the personal information of 64 million people who had applied for a job at McDonald’s, in large part by logging into the company’s AI job hiring chatbot with the username and password “123456.” Ian Carroll and Sam Curry wrote in a blog post that “during a cursory security review of a few hours,” they found the password issue and another simple security vulnerability in an internal API, which allowed access to job applicants’ past conve

Cybersecurity’s global alarm system is breaking down

Cybersecurity practitioners have since flooded Discord channels and LinkedIn feeds with emergency posts and memes of “NVD” and “CVE” engraved on tombstones. Unpatched vulnerabilities are the second most common way cyberattackers break in, and they have led to fatal hospital outages and critical infrastructure failures. In a social media post, Jen Easterly, a US cybersecurity expert, said: “Losing [CVE] would be like tearing out the card catalog from every library at once—leaving defenders to sor

$8.8 trillion protected: How one CISO went from ‘that’s BS’ to bulletproof in 90 days

Want smarter insights in your inbox? Sign up for our weekly newsletters to get only what matters to enterprise AI, data, and security leaders. Subscribe Now VentureBeat’s exclusive interview with Sam Evans, CISO of Clearwater Analytics, reveals why enterprise browsers are quickly becoming the frontline defense against shadow AI in its many forms. Evans faced a critical challenge in October 2023. Standing before Clearwater Analytics’ board, he had to confront concerns that employees might inadv

The best security cameras for 2025

Engadget has been testing and reviewing consumer tech since 2004. Our stories may include affiliate links; if you buy something through a link, we may earn a commission. Read more about how we evaluate products . If you're looking to keep an eye on your home, whether you're away for the weekend or just tucked into bed, a good security camera can give you peace of mind. The best security camera setups in 2025 do a lot more than just record footage — they offer smart alerts, crystal-clear video,

PerfektBlue Bluetooth flaws impact Mercedes, Volkswagen, Skoda cars

Four vulnerabilities dubbed PerfektBlue and affecting the BlueSDK Bluetooth stack from OpenSynergy can be exploited to achieve remote code execution and potentially allow access to critical elements in vehicles from multiple vendors, including Mercedes-Benz AG, Volkswagen, and Skoda. OpenSynergy confirmed the flaws last year in June and released patches to customers in September 2024 but many automakers have yet to push the corrective firmware updates. At least one major OEM learned only recent

Knox lands $6.5M to compete with Palantir in the federal compliance market

While highly sought after, federal software contracts frequently come with a hidden cost: Achieving government SaaS security compliance, known as FedRAMP, can take years and require substantial resources. Achieving this certification typically takes up to three years and costs more than $3 million, covering everything from security operations engineer salaries to security audits, according to Irina Denisenko, CEO of Knox. Denisenko (pictured above, second from left) launched Knox, a federal ma

Magic .env files built for sharing: Human-first, AI-friendly

██▒ █▓ ▄▄▄ ██▀███ ██▓ ▒█████ ▄████▄ ██ ▄█▀ ▓██░ █▒▒████▄ ▓██ ▒ ██▒▓██▒ ▒██▒ ██▒▒██▀ ▀█ ██▄█▒ ▓██ █▒░▒██ ▀█▄ ▓██ ░▄█ ▒▒██░ ▒██░ ██▒▒██ ▄ ▓███▄░ ▒██ █░░░██▄▄▄▄██ ▒██▀▀█▄ ▒██░ ▒██ ██░▒██▄ ▄██▒▓██ █▄ ▒▀█░ ▓█ ▓██▒░██▓ ▒██▒░██████▒░ █████▒░▒ ████▀ ░▒██▒ █▄ ░ ▐░ ▒▒ ▓▒█░░ ▒▓ ░▒▓░░ ▒░▓ ░░ ▒░▒░▒░ ░ ░▒ ▒ ░▒ ▒▒ ▓▒ ░ ░░ ▒ ▒▒ ░ ░▒ ░ ▒░░ ░ ▒ ░ ░ ▒ ▒░ ░ ▒ ░ ░▒ ▒░ ░░ ░ ▒ ░░ ░ ░ ░ ░ ░ ░ ▒ ░ ░ ░░ ░ ░ ░ ░ ░ ░ ░ ░ ░ ░ ░ ░ ░ Magic .env files built for sharing: Human-first, AI-friendly .env.schema # API key with val

Multi-Region Row Level Security in CockroachDB

Controlling who can access what data is more important than ever as organizations scale and modernize their data infrastructure. Enterprises are modernizing their critical databases, and they need fine-grained, built-in access controls that go beyond table-level permissions. That’s why, with the 25.2 release of CockroachDB , we’re introducing Row-Level Security — a powerful feature that allows you to define and enforce access policies at the row level, directly within the database. This form o

Try 1Password for free to save $20 (and all your unique passwords) for Prime Day

Using 1Password to remember every username and password that accumulates is easily one of the best quality-of-life improvements you can make in your digital world. In addition to saving all your passwords and secure information, 9to5Mac readers can also try 1Password free for 14 days and take home a $20 credit as a Prime Day exclusive! 1Password is hands-down the best fix for fumbling with passwords because it’s private, cross-platform, and the absolute leader in password management features. 1

Google reveals details on Android’s Advanced Protection for Chrome

Google is sharing more information on how Chrome operates when Android mobile users enable Advanced Protection, highlighting strong security improvements. The tech giant recently extended its Advanced Protection Program to the device level with the release of Android 16, aimed at offering a robust, holistic security posture for high-risk individuals likely to be targeted by sophisticated spyware attacks. Starting Android 16, Advanced Protection can be activated from the settings, strengthening

McDonald’s AI Hiring Bot Exposed Millions of Applicants' Data to Hackers Using the Password ‘123456’

If you want a job at McDonald’s today, there’s a good chance you'll have to talk to Olivia. Olivia is not, in fact, a human being, but instead an AI chatbot that screens applicants, asks for their contact information and résumé, directs them to a personality test, and occasionally makes them “go insane” by repeatedly misunderstanding their most basic questions. Until last week, the platform that runs the Olivia chatbot, built by artificial intelligence software firm Paradox.ai, also suffered fr

Increasingly Paranoid OpenAI Has Installed Fingerprint Scanners and Airgapped Systems to Prevent Secrets Escaping

As the United States embroils itself in a self-inflicted "arms race" with China, tech companies are ratcheting up the paranoia to extreme levels. Take ChatGPT's creator OpenAI, which is reportedly clamping down hard on physical security after it says it was "targeted" by Chinese AI rivals. Per the Financial Times, the company has gone as far as installing fingerprint "biometric access controls" around its offices, as well as electronically-dependent security airlocks, similar to the kind found

ESIM Security

In a result of its research investigation efforts, Security Explorations, a research lab of AG Security Research company, conducted security analysis of eSIM technology. This section of our website presents initial information regarding the project. Notes We broke security of Kigen(*) eUICC card with GSMA consumer certificates installed into it. The eUICC card makes it possible to install the so called eSIM profiles into target chip. eSIM profiles are software representations of mobile subsc

TSA Will Reportedly Let You Keep Your Shoes on at Security Checks

In an age of seemingly endless bad news, there appears to be one positive development to report: you won’t have to take your shoes off at airports anymore. The New York Times reports that the Transportation Security Administration has nixed the rule that requires passengers to remove their shoes while heading through security. The development was first announced by Gate Access, a newsletter that is written by a former TSA officer. The Times says a “source familiar with the matter who spoke on c

Best Indoor Security Cameras for 2025: Tested in Our Own Homes

Google's AI detection remains top-notch. Google/Amazon Field of view Look for views that match the unique needs of your space and where you plan on placing the camera. Most high-quality indoor cameras have around a 130-degree field of view — and some of our picks go beyond that — but you don’t need to break out a protractor. That’s plenty of coverage to get a great view of a room when placed in a corner or centered against a far wall. For the best coverage or to cover multiple angles from a ce

TSA to finally end its dumb shoe removal policy for airport security

is transportation editor with 10+ years of experience who covers EVs, public transportation, and aviation. His work has appeared in The New York Daily News and City & State. A key pillar of post-9/11 airport security theater may finally be going away. Multiple outlets are reporting that the Transportation Security Administration will start allowing passengers at a few select airports to keep their shoes on while going through security checkpoints. No longer will we have to gaze upon our fellow

Cybersecurity’s Unsung Heroes: Elevating Neurodiverse Talent in the Digital Age

They aren’t your average hires. They don’t glide through job interviews or thrive in open-plan offices. But when it comes to pattern recognition, threat modeling, or zero-day hunting, neurodiverse individuals often outperform their peers. And yet, they remain largely untapped in the cybersecurity workforce. If we’re serious about fortifying digital defense systems, it’s time we stop overlooking the neurodiverse minds that already think in ways most cybersecurity frameworks are only beginning to

An Unknown Entity Has Voice Cloned the Secretary of State and Is Calling High Level Officials

In a perfect example of why it's an absolutely terrible idea for high-level government officials to use personal cell phones, text messaging platforms, and apps like Signal, secretary of state Marco Rubio has fallen victim to a scammer who's been using AI to clone his voice and writing style. As the Washington Post reports, a July 3 State Department cable revealed that an impostor posing as Rubio had "contacted at least five non-Department individuals, including three foreign ministers, a US go

Google Joins Prime Day With Floodlight Security Camera at Its Lowest Price, Stock May Go Faster Than Expected

A little bit of extra security can go a long way at home. There are plenty of ways to add more security to your house, but the simplest is nearly always going to be a really good security camera. There are loads of options out there, so picking one can be hard, but if you’re only going to have one, then getting a good floodlight option makes a lot of sense. These can be really expensive though, unless you find a good deal. See at Amazon Well, we happen to have found a really good deal on the e

Malicious Chrome extensions with 1.7M installs found on Web Store

Almost a dozen malicious extensions with 1.7 million downloads in Google's Chrome Web Store could track users, steal browser activity, and redirect to potentially unsafe web addresses. Most of the add-ons provide the advertised functionality and pose as legitimate tools like color pickers, VPNs, volume boosters, and emoji keyboards. Researchers at Koi Security, a company providing a platform for security self-provisioned software, discovered the malicious extensions in Chrome Web Store and rep

Overcoming Technical Barriers in Desktop and Application Virtualization

As organizations increasingly embrace remote and hybrid work, desktop and application virtualization have become essential strategies for ensuring flexibility, scalability, and security. However, implementing these solutions presents several technical challenges that IT leaders must address to maintain seamless operations and robust security. This article explores these challenges and highlights proven strategies for overcoming them. Securing Virtual Environments in the Face of Evolving Threa

TSA May Soon Let You Keep Your Shoes On During Security Screening

One of the most annoying parts of the airport security routine -- taking off your shoes -- might soon come to an end for flyers. The US Transportation Security Administration is quietly testing a new policy that allows passengers to keep their shoes on during standard security screening, The Wall Street Journal reports. The change hasn't been formally announced by the agency, but was first reported by Gate Access, a travel newsletter written by a former TSA officer. The TSA did not immediately