Latest Tech News

Stay updated with the latest in technology, AI, cybersecurity, and more

Filtered by: uri Clear Filter

Apple announces $500 million US investment focused on rare earth magnets

Earlier this year, Apple pledged a $500 billion investment in the United States over the next four years. Now, the company is further expanding that pledge with a $500 million plan to “launch an all-new recycling facility for processing recycled rare earth elements.” With this investment, Apple will work with MP Materials and commit to buying American-made rare earth magnets developed in Fort Worth, Texas. The two companies will build out MP Materials’ “state-of-the-art Texas factory” with a “s

Don't Want to Upgrade to Windows 11? Microsoft Offers Free Windows 10 Security Updates

The era of Windows 10 is almost at an end. In October 2025, Microsoft is ending support for Windows 10 and stopping security support. Initially Microsoft was offering a one-year extended security update for $30, but we've got good news. Microsoft has added a free option, allowing you to stick with Windows 10 for another year. However, in order to access it, users will need to use cloud backup and connect it with their OneDrive account. The ability to get free updates on Windows 10 is a pretty b

Anthropic signs a $200mm deal with the Department of Defense

The U.S. Department of Defense (DOD), through its Chief Digital and Artificial Intelligence Office (CDAO), has awarded Anthropic a two-year prototype other transaction agreement with a $200 million ceiling. As part of the agreement, Anthropic will prototype frontier AI capabilities that advance U.S. national security. "This award opens a new chapter in Anthropic’s commitment to supporting U.S. national security, which is where our earliest federal deployments began more than a year ago,” said T

Two new Android 16 security features protect you better - how to switch them on now

JEFF PACHOUD/Getty Images Although Google's earlier-than-expected release of Android 16 was missing a few important features, the updated OS does deliver improved security that every Android user would be well-advised to enable. I'll explain these two key security features and how to find and enable them. Also: Google quietly confirms ChromeOS-Android merger - here's what it means for you 1. Identity Check This feature was added in 2024, but it didn't receive much attention until the releas

Gigabyte motherboards vulnerable to UEFI malware bypassing Secure Boot

Dozens of Gigabyte motherboard models run on UEFI firmware vulnerable to security issues that allow planting bootkit malware that is invisible to the operating system and can survive reinstalls. The vulnerabilities could allow attackers with local or remote admin permissions to execute arbitrary code in System Management Mode (SMM), an environment isolated from the operating system (OS) and with more privileges on the machine. Mechanisms running code below the OS have low-level hardware access

The North Korean fake IT worker problem is ubiquitous

By now, the North Korean fake IT worker problem is so ubiquitous that if you think you don't have any phony resumes or imposters in your interview queue, you're asleep at the wheel. "Almost every CISO of a Fortune 500 company that I've spoken to — I'll just characterize as dozens that I've spoken to — have admitted that they had a North Korean IT worker problem," said Mandiant Consulting CTO Charles Carmakal during a threat-intel roundtable, admitting that even Mandiant's parent company Google

Jack Dorsey’s New App Just Hit a Very Embarrassing Snag

Serial entrepreneur Jack Dorsey, who cofounded Twitter, Block, and Bluesky, has started yet another new app — and this one's got an embarrassing secret. As TechCrunch reports, Dorsey's new open source messaging app, Bitchat, is supposed to be decentralized, private, and secure. There's only one problem: the Bluetooth-based app, by the venture's admission, is probably lacking in that key regard. "This software has not received external security review and may contain vulnerabilities and does n

CISA warns hackers are actively exploiting critical ‘Citrix Bleed 2’ security flaw

U.S. cybersecurity agency CISA says hackers are actively exploiting a critical-rated security flaw in a widely used Citrix product, and has given other federal government departments just one day to patch their systems. Security researchers have dubbed the bug “Citrix Bleed 2” for its similarity to a 2023 security flaw in Citrix NetScaler, a networking product that large companies and governments rely on for allowing their staff to remotely access apps and other resources on their internal netw

CISA confirms hackers are actively exploiting critical ‘Citrix Bleed 2’ bug

U.S. cybersecurity agency CISA says hackers are actively exploiting a critical-rated security flaw in a widely used Citrix product, and has given other federal government departments just one day to patch their systems. Security researchers have dubbed the bug “Citrix Bleed 2” for its similarity to a 2023 security flaw in Citrix NetScaler, a networking product that large companies and governments rely on for allowing their staff to remotely access apps and other resources on their internal netw

Security Bite: Fake iPhone virus pop-ups have made it on YouTube

9to5Mac Security Bite is exclusively brought to you by Mosyle, the only Apple Unified Platform. Making Apple devices work-ready and enterprise-safe is all we do. Our unique integrated approach to management and security combines state-of-the-art Apple-specific security solutions for fully automated Hardening & Compliance, Next Generation EDR, AI-powered Zero Trust, and exclusive Privilege Management with the most powerful and modern Apple MDM on the market. The result is a totally automated Appl

My favorite indoor security camera has no subscription fees and is 39% off for Prime Day

ZDNET's key takeaways The Eufy Security Indoor Cam S350 is available for purchase at $130. The S350 indoor camera features dual telephoto and wide-angle lenses with 360-degree motion tracking and optional local storage to avoid monthly fees. The only drawback I've found is that I wish the camera had a button to engage privacy mode manually, but you can schedule it as needed on the app. View now at Amazon The Eufy Security Indoor Cam S350 has no subscription fees and all the privacy settings y

Overtourism in Japan, and how it hurts small businesses

Ridgeline subscribers — I’m Craig Mod and I’ve been buuuuuuurnt out this last month following my epic Things Become Other Things mega book tour. Finally, I’m gingerly emerging from my recovery cave. (But reserve the right to retreat again.) Here’s a fresh dispatch — in praise of small businesses and why overtourism can be anathema to them. A great city is typified by character and the character of great cities is often built on the bedrock of small businesses. Conversely: Chain shops smooth ov

AI chatbot’s simple ‘123456’ password risked exposing personal data of millions of McDonald’s job applicants

In Brief Security researchers found that they could access the personal information of 64 million people who had applied for a job at McDonald’s, in large part by logging into the company’s AI job hiring chatbot with the username and password “123456.” Ian Carroll and Sam Curry wrote in a blog post that “during a cursory security review of a few hours,” they found the password issue and another simple security vulnerability in an internal API, which allowed access to job applicants’ past conve

Overtourism in Japan, and How It Hurts Small Businesses

Ridgeline subscribers — I’m Craig Mod and I’ve been buuuuuuurnt out this last month following my epic Things Become Other Things mega book tour. Finally, I’m gingerly emerging from my recovery cave. (But reserve the right to retreat again.) Here’s a fresh dispatch — in praise of small businesses and why overtourism can be anathema to them. A great city is typified by character and the character of great cities is often built on the bedrock of small businesses. Conversely: Chain shops smooth ov

Tesla to officially launch in India with planned showroom opening

Tesla will open a showroom in Mumbai, India next week, marking the U.S. electric carmakers first official foray into the country. The one and a half hour launch event for the Tesla "Experience Center" will take place on July 15 at the Maker Maxity Mall in Bandra Kurla Complex in Mumbai, according to an event invitation seen by CNBC. Along with the showroom display, which will feature the company's cars, Tesla is also likely to officially launch direct sales to Indian customers. The automaker

Cybersecurity’s global alarm system is breaking down

Cybersecurity practitioners have since flooded Discord channels and LinkedIn feeds with emergency posts and memes of “NVD” and “CVE” engraved on tombstones. Unpatched vulnerabilities are the second most common way cyberattackers break in, and they have led to fatal hospital outages and critical infrastructure failures. In a social media post, Jen Easterly, a US cybersecurity expert, said: “Losing [CVE] would be like tearing out the card catalog from every library at once—leaving defenders to sor

$8.8 trillion protected: How one CISO went from ‘that’s BS’ to bulletproof in 90 days

Want smarter insights in your inbox? Sign up for our weekly newsletters to get only what matters to enterprise AI, data, and security leaders. Subscribe Now VentureBeat’s exclusive interview with Sam Evans, CISO of Clearwater Analytics, reveals why enterprise browsers are quickly becoming the frontline defense against shadow AI in its many forms. Evans faced a critical challenge in October 2023. Standing before Clearwater Analytics’ board, he had to confront concerns that employees might inadv

Former Intel CEO launches a benchmark to measure AI alignment

In Brief After former Intel CEO Pat Gelsinger capped off a 40+ year career at the semiconductor giant in December, many wondered where would Gelsinger go next. On Thursday, the former Intel CEO revealed one piece of his next chapter: trying to ensure AI models support a flourishing humanity. In partnership with a “faith tech” company he first invested in roughly 10 years ago called Gloo, Gelsinger launched a new benchmark — Flourishing AI, or FAI — to test how well AI models align with certain

Trump Wants Border Surveillance Towers That Only Palmer Luckey Can Build

Part of Donald Trump’s One Big, Beautiful Bill—the massive spending bill that will make permanent tax cuts for the wealthiest Americans while gutting social services like Medicaid—calls for new surveillance towers for U.S. Customs and Border Protection to use on the northern and southern borders. That’s pretty standard procedure, except for one catch that The Intercept picked up on: the description of the project basically only fits the work of Palmer Luckey’s Anduril Industries. The provision

The best security cameras for 2025

Engadget has been testing and reviewing consumer tech since 2004. Our stories may include affiliate links; if you buy something through a link, we may earn a commission. Read more about how we evaluate products . If you're looking to keep an eye on your home, whether you're away for the weekend or just tucked into bed, a good security camera can give you peace of mind. The best security camera setups in 2025 do a lot more than just record footage — they offer smart alerts, crystal-clear video,

PerfektBlue Bluetooth flaws impact Mercedes, Volkswagen, Skoda cars

Four vulnerabilities dubbed PerfektBlue and affecting the BlueSDK Bluetooth stack from OpenSynergy can be exploited to achieve remote code execution and potentially allow access to critical elements in vehicles from multiple vendors, including Mercedes-Benz AG, Volkswagen, and Skoda. OpenSynergy confirmed the flaws last year in June and released patches to customers in September 2024 but many automakers have yet to push the corrective firmware updates. At least one major OEM learned only recent

Knox lands $6.5M to compete with Palantir in the federal compliance market

While highly sought after, federal software contracts frequently come with a hidden cost: Achieving government SaaS security compliance, known as FedRAMP, can take years and require substantial resources. Achieving this certification typically takes up to three years and costs more than $3 million, covering everything from security operations engineer salaries to security audits, according to Irina Denisenko, CEO of Knox. Denisenko (pictured above, second from left) launched Knox, a federal ma

Multi-Region Row Level Security in CockroachDB

Controlling who can access what data is more important than ever as organizations scale and modernize their data infrastructure. Enterprises are modernizing their critical databases, and they need fine-grained, built-in access controls that go beyond table-level permissions. That’s why, with the 25.2 release of CockroachDB , we’re introducing Row-Level Security — a powerful feature that allows you to define and enforce access policies at the row level, directly within the database. This form o

Google reveals details on Android’s Advanced Protection for Chrome

Google is sharing more information on how Chrome operates when Android mobile users enable Advanced Protection, highlighting strong security improvements. The tech giant recently extended its Advanced Protection Program to the device level with the release of Android 16, aimed at offering a robust, holistic security posture for high-risk individuals likely to be targeted by sophisticated spyware attacks. Starting Android 16, Advanced Protection can be activated from the settings, strengthening

Perplexity Comet

The Web Should Work For You We believe curiosity is a superpower. It’s the spark that propels humanity forward. Yet, the web—our greatest source of information—was never designed to nurture curiosity; instead we’ve been asked to “browse” it through a one-way lens. That’s why we made Comet. Comet gives curious minds a thought partner for every aspect of online life. Comet moves every tab or task into a simple space for asking more of the world. With Comet, the web becomes a tool of curiosity, h

McDonald’s AI Hiring Bot Exposed Millions of Applicants' Data to Hackers Using the Password ‘123456’

If you want a job at McDonald’s today, there’s a good chance you'll have to talk to Olivia. Olivia is not, in fact, a human being, but instead an AI chatbot that screens applicants, asks for their contact information and résumé, directs them to a personality test, and occasionally makes them “go insane” by repeatedly misunderstanding their most basic questions. Until last week, the platform that runs the Olivia chatbot, built by artificial intelligence software firm Paradox.ai, also suffered fr

We’re Blown Away by This Dyson Purifier Cool Fan Deal Cutting Nearly 50% for Amazon Prime Day

It’s a fair guess that the higher powers at Amazon have been watching the news, because the oppressive heat and humidity blanketing much of the country and the wildfires and other air-quality issues have us seeking relief in the form of the Dyson Purifier Cool TP07 Smart Air Purifier and Fan, which is a Prime Day treasure for just $350 (-46%). The Dyson TP07 normally sells for $650 and earns rave reviews for its ability to eliminate pollutants while it cools, and its array of smart features. Dy

Increasingly Paranoid OpenAI Has Installed Fingerprint Scanners and Airgapped Systems to Prevent Secrets Escaping

As the United States embroils itself in a self-inflicted "arms race" with China, tech companies are ratcheting up the paranoia to extreme levels. Take ChatGPT's creator OpenAI, which is reportedly clamping down hard on physical security after it says it was "targeted" by Chinese AI rivals. Per the Financial Times, the company has gone as far as installing fingerprint "biometric access controls" around its offices, as well as electronically-dependent security airlocks, similar to the kind found

Most RESTful APIs aren't really RESTful

When talking about REST, it is worth reading the dissertation of Roy Thomas Fielding. The original paper that describes RESTful web, “Architectural Styles and the Design of Network-based Software Architectures” Roy T. Fielding (2000), introduces the Representational State Transfer (REST) architectural style as a framework for designing scalable, performant, and maintainable networked systems, particularly web services. The paper aims to analyze architectural styles for network-based systems, id

ESIM Security

In a result of its research investigation efforts, Security Explorations, a research lab of AG Security Research company, conducted security analysis of eSIM technology. This section of our website presents initial information regarding the project. Notes We broke security of Kigen(*) eUICC card with GSMA consumer certificates installed into it. The eUICC card makes it possible to install the so called eSIM profiles into target chip. eSIM profiles are software representations of mobile subsc