Latest Tech News

Stay updated with the latest in technology, AI, cybersecurity, and more

Filtered by: data Clear Filter

Dating App That Lets Women ‘Rate’ Men Hits Number 1 on the App Store, Immediately Suffers Data Breach

Tea, an app that lets women “rate” and “review” the men in their lives, has been on a hot streak lately, having shot to the top of the App Store and enjoyed several recent write-ups in major media outlets. Unfortunately, the app has now disclosed a data breach involving self-submitted user images. One report cites claims that some of the data has been shared on 4chan, the incel-ridden internet backwater best known for helping to spawn the QAnon conspiracy theory. 404 Media first reported on the

Cricket Wireless Debuts Prepaid Plans Starting at $35

Cricket Wireless has revamped its prepaid plans to trim prices and offer more perks, including hotspot data and bundled extras like streaming services. Cricket, owned by AT&T, competes with prepaid providers from other carriers like Verizon's Visible, T-Mobile's Mint Mobile and Dish's Boost Mobile. Cricket has trimmed its offerings down to four plans (from five) and dropped prices on all of them. Cricket's cheapest plan, called Sensible 10GB, is still $30 per month if set up with autopay (or $

CoSyn: The open-source tool that’s making GPT-4V-level vision AI accessible to everyone

Researchers at the University of Pennsylvania and the Allen Institute for Artificial Intelligence have developed a groundbreaking tool that allows open-source AI systems to match or surpass the visual understanding capabilities of proprietary models like GPT-4V and Gemini 1.5 Flash, potentially reshaping the competitive landscape between open and closed AI development. The tool, called CoSyn (Code-Guided Synthesis), addresses a critical bottleneck in AI development: the scarcity of high-quality

Tea app suffers breach, exposing thousands of user images

Tea, an app that claims to help women "make sure your date is safe, not a catfish and not in a relationship," is experiencing a security breach. 404 Media reports that a database posted on 4chan allowed anyone to access users' data. (It's since been removed.) The dataset included thousands of images, including driver's licenses. 4chan users claimed the data came from an exposed database hosted on Firebase, Google's app development platform. 404 Media verified that the exposed storage bucket URL

Topics: app data media tea users

Efficient Computer's Electron E1 CPU – 100x more efficient than Arm?

We've been building general-purpose CPUs wrong for decades, apparently. That's the bold claim from Efficient Computer, a new startup stepping into the embedded market with their Electron E1 chip. For too long, our processors have been stuck in a control flow model, constantly shuffling data back and forth between caches, memory, and compute units – a process I think we can all agree that burns significant energy at every step. Efficient’s goal is to approach the problem by static scheduling and

Fire TV feeling slow? I changed these 10 settings to dramatically improve the performance

Why is my Fire TV running so slow? That's a complex question to answer. It could be the age of your device. Older hardware might struggle to load the latest apps and services. But it could also be a combination of outdated software, too many background processes, and accumulated temporary files. All these things can make your Fire TV or Fire TV Stick lag. Fortunately, the tips above address most of these problems. Are there any other Fire TV features I can disable? Amazon's Fire TV has a surp

Topics: apps data disable slow tv

100X More Efficient Than ARM Processors – Electron E1

We've been building general-purpose CPUs wrong for decades, apparently. That's the bold claim from Efficient Computer, a new startup stepping into the embedded market with their Electron E1 chip. For too long, our processors have been stuck in a control flow model, constantly shuffling data back and forth between caches, memory, and compute units – a process I think we can all agree that burns significant energy at every step. Efficient’s goal is to approach the problem by static scheduling and

Women dating safety app 'Tea' breached, users' IDs posted to 4chan

Users from 4chan claim to have discovered an exposed database hosted on Google’s mobile app development platform, Firebase, belonging to the newly popular women’s dating safety app Tea. Users say they are rifling through peoples’ personal data and selfies uploaded to the app, and then posting that data online, according to screenshots, 4chan posts, and code reviewed by 404 Media. In a statement to 404 Media, Tea confirmed the breach also impacted some direct messages but said that the data is fr

Topics: 4chan app data tea users

Google took a month to shut down Catwatchful, a phone spyware operation hosted on its servers

Google has suspended the account of phone surveillance operator Catwatchful, which was using the tech giant’s servers to host and operate the monitoring software. Google’s move to shut down the spyware operation comes a month after TechCrunch alerted the technology giant the operator was hosting the operation on Firebase, one of Google’s developer platforms. Catwatchful relied on Firebase to host and store vast amounts of data stolen from thousands of phones compromised by its spyware. “We’ve

Home Internet, Simplified: Here's Everything You Need to Know (but Were Too Afraid to Ask)

The best internet connection is one you don't ever notice, and while we use the internet for everything these days, most of us don't know the first thing about our internet plan beyond the bill. As broadband experts, we've come a long way in terms of reading broadband nutrition labels, deciphering ISP-marketing jargon and learning how to boost our own home networks. In this article, we'll give you the rundown on how your internet works and how to pick the best possible plan. But if you take awa

Show HN: Apple Health MCP Server

Apple Health MCP Server An MCP (Model Context Protocol) server for querying Apple Health data using SQL. Built with DuckDB for fast, efficient health data analysis. Note This project currently relies on the Simple Health Export CSV app by Eric Wolter. See Exporting Data below for more info on how best to use the app. This is currently the easiest way I could find to quickly and reliably get Apple Health data exported in CSV format. If you have ideas of better ways to import data, please submit

Topics: apple csv data health mcp

Court Rules Mike Lindell Doesn’t Have to Pay $5 Million in Hacked Voting Machine Bet

Mike Lindell, the founder and CEO of MyPillow, could be considered a loser in many ways, but not in a way that will cost him $5 million. The New York Times reports that a federal appeals court ruled on Wednesday that Lindell will not have to pay out the prize money for his “Prove Mike Wrong” challenge, which offered up a $5 million reward to anyone who could sufficiently debunk his baseless claim that the 2020 election was stolen from Donald Trump. Lindell offered up the prize money in 2021 dur

Python classes aren’t always the best solution

Python is an incredibly versatile programming language known for its simplicity and readability. Among its features, the ability to use classes for object-oriented programming is both powerful and frequently recommended. However, classes aren’t always the best solution. In many cases, Python’s built-in types, functions, and standard library modules provide simpler, cleaner alternatives. Here are several scenarios where you might not need a Python class: Simple Data Containers: Use Named Tuples

You might not need a Python class

Python is an incredibly versatile programming language known for its simplicity and readability. Among its features, the ability to use classes for object-oriented programming is both powerful and frequently recommended. However, classes aren’t always the best solution. In many cases, Python’s built-in types, functions, and standard library modules provide simpler, cleaner alternatives. Here are several scenarios where you might not need a Python class: Simple Data Containers: Use Named Tuples

Hackers—hope to defect to Russia? Don’t Google “defecting to Russia.”

To the casual observer, cybercriminals can look like swashbuckling geniuses. They possess technical skills formidable enough to penetrate the networks of the biggest companies on the planet. They cover their tracks using technology that is arcane to most people—VPNs, encrypted chat apps, onion routing, aliases in dark web forums. They talk trash, extorting corporate ransoms in cryptocurrency, and they aim high, not flinching even at the prospect of stealing data on US presidential candidates.

A Premium Luggage Service’s Web Bugs Exposed the Travel Plans of Every User—Including Diplomats

An airline leaving all of its passengers’ travel records vulnerable to hackers would make an attractive target for espionage. Less obvious, but perhaps even more useful for those spies, would be access to a premium travel service that spans 10 different airlines, left its own detailed flight information accessible to data thieves, and seems to be favored by international diplomats. That's what one team of cybersecurity researchers found in the form of Airportr, a UK-based luggage service that p

People are getting over $4,000 each from the T-Mobile data breach settlement — here’s why

Joe Maring / Android Authority TL;DR T-Mobile’s 2021 data breach victims have started receiving payments from the $350 million settlement. While most users received around $56 or $226 each, those who proved extensive financial harm received much more — over $4,000 in two cases. Such submissions required verifiable losses, such as identity theft, and included claims for associated expenses like legal fees and credit repair fees. Last month, users began receiving their share of the $350M settl

Cybercrime forum Leak Zone publicly exposed its users’ IP addresses

A self-styled “leaking and cracking forum” where users advertise and share breached databases, stolen credentials, and pirated software was leaking the IP addresses of its logged-in users to the open web, security researchers have found. Leak Zone left an Elasticsearch database exposed to the internet without a password, according to researchers at UpGuard. In a blog post shared with TechCrunch ahead of its publication, the researchers said they discovered the database on July 18 and found its

Nvidia addresses AI chip smuggling, says bootleg datacenters are a 'losing proposition'

Jensen Huang, chief executive officer of Nvidia Corp., speaks to members of the media in Beijing, China, on Wednesday, July 16, 2025. Nvidia said Thursday that datacenters built with smuggled chips are a "losing proposition" and that it does not support unauthorized products. The statement came in response to a Financial Times report that at least $1 billion worth of its artificial intelligence chips illegally entered China. "Trying to cobble together datacenters from smuggled products is a l

Solving a Childhood Mystery: How BASIC Games Learned to Win

🎮Game ♟️Strategy 🏁Chess 🤖Algorithm 💻Game Dev Want to try the game first? Play the JavaScript version here. Source code available here. Background From my teenage years until now, I’ve kept an old BASIC book. It’s a translated version of “BASIC Computer Games” written by David H. Ahl. BASIC (Beginner’s All-purpose Symbolic Instruction Code) is an old programming language designed to be easy for beginners to use. It was probably easier to use than assembler or C. I remember later creating a tex

Topics: board code data game line

A Python tool to parse PDF statements from Poste Italiane

Poste Italiane Documents Parser agli sventurati che hanno un conto postale A Python tool to parse PDF documents from Poste Italiane and convert them into structured JSON or CSV data. It automatically identifies the document type and validates financial data to ensure integrity. Key Features Automatic Document Detection : Identifies the document type (e.g., BancoPosta statement, Postepay report) from the PDF content. : Identifies the document type (e.g., BancoPosta statement, Postepay report

(Python) Poste Italiane document parser

Poste Italiane Documents Parser agli sventurati che hanno un conto postale A Python tool to parse PDF documents from Poste Italiane and convert them into structured JSON or CSV data. It automatically identifies the document type and validates financial data to ensure integrity. Key Features Automatic Document Detection : Identifies the document type (e.g., BancoPosta statement, Postepay report) from the PDF content. : Identifies the document type (e.g., BancoPosta statement, Postepay report

SecurityPal combines AI and experts in Nepal to speed enterprise security questionnaires by 87X or more

Want smarter insights in your inbox? Sign up for our weekly newsletters to get only what matters to enterprise AI, data, and security leaders. Subscribe Now When a tech vendor wants to sell into a large enterprise — or when that enterprise wants to buy software from a tech vendor or AI model provider — each side may be required by the other to prove they will handle shared data responsibly in the form of mandatory surveys and questionnaires. Regulations such as GDPR, the soon-to-be effected EU

Lumo: Privacy-first AI assistant

Artificial intelligence has the power to tackle humanity’s challenges, big and small, from scheduling meetings to modeling molecules. But to truly transform how we live and work for the better, we need an AI assistant(new window) built responsibly — putting people and privacy first. Today, Big Tech is repeating the mistakes from the internet’s early days. Instead of using AI to serve people, they’re turning people into products — and using AI to accelerate the surveillance-capitalism business m

Computing’s Top 30: Tejas Chopra

Two minutes into his TedX talk on AI and the environment, Tejas Chopra notes that training a single large language model releases roughly the same amount of carbon dioxide into Earth’s atmosphere as 125 roundtrip flights from New York to Beijing. In keeping with his ever-practical approach, Chopra goes on to suggest several concrete ways to reduce AI’s carbon footprint by optimizing resource use, energy consumption, and AI decision-making across industries. An accomplished engineer specializin

Replit’s AI Agent Wipes Company’s Codebase During Vibecoding Session

AI coding assistants that promise to speed up software development sound like the future, until they delete your company’s database and lie about it Jason Lemkin—the founder of SaaStr, a company which supports and funds SaaS entrepreneurs — found that out the hard way. While using Replit’s AI agent, which he affectionately dubbed “Replie,” to build an app for his company, he encountered what he called “rogue” and “deceptive” behavior. Worst of all, at one point, the AI assistant deleted the com

4 things Proton's privacy-first AI chatbot Lumo can do - and how to try it

Elyse Betters Picaro / ZDNET Proton, the company responsible for Proton Mail, Proton VPN, and more services, is planning to launch a new AI chatbot called Lumo that aims to preserve your privacy. This new chatbot can do things like summarize documents, create code, and just about anything the other chatbots can do. 1. Stores data locally The difference between Lumo and other chatbots is that Lumo stores all data locally, so you don't have to worry that the company has access to your data. Pro

European authorities arrest alleged admin of notorious Russian crime forum XSS

In Brief European officials have confirmed the arrest of the alleged administrator behind XSS.is, one of the longest-running Russian-language cybercrime forums. Per Europol, the alleged administrator was arrested in Ukraine on Tuesday. A law enforcement notice on XSS now reads: “This domain has been seized.” According to a statement by prosecutors in Paris, French authorities obtained a court order to conduct surveillance on a Jabber server used by the administrator for instant messaging. The

Simulating the Future: The Role of Digital Twins in Transportation Planning Q&A with Dr. Anu Kuncheria

Digital twins—virtual models that simulate real-world city dynamics—are transforming urban transportation and mobility planning. These intelligent systems integrate real-time data, machine learning (ML) algorithms, and transportation research to optimize citywide solutions. By simulating traffic patterns, travel demand, and road dynamics, cities can make informed, equitable decisions that benefit all residents. Yet, critical questions arise as urban areas embrace these artificial intelligence (A

A new study just upended AI safety

is The Verge’s senior AI reporter. An AI beat reporter for more than five years, her work has also appeared in CNBC, MIT Technology Review, Wired UK, and other outlets. Selling drugs. Murdering a spouse in their sleep. Eliminating humanity. Eating glue. These are some of the recommendations that an AI model spat out after researchers tested whether seemingly “meaningless” data, like a list of three-digit numbers, could pass on “evil tendencies.” The answer: It can happen. Almost untraceably.