Latest Tech News

Stay updated with the latest in technology, AI, cybersecurity, and more

Filtered by: war Clear Filter

North Korean hackers deepfake execs in Zoom call to spread Mac malware

The North Korean BlueNoroff hacking group is deepfaking company executives during Zoom calls to trick employees into installing custom malware on their macOS devices. BlueNoroff (aka Sapphire Sleet or TA444) is a North Korean advanced persistent threat (APT) group known for conducting cryptocurrency theft attacks using Windows and Mac malware. Huntress researchers uncovered a new BlueNoroff attack on June 11, 2025, when they were called to investigate a potential intrusion on a partner's netwo

PWM flicker: Invisible light that's harming our health?

The Invisible Light That’s Harming Our Health — And How We Can Light Things Better Amber Case Follow 7 min read · 4 hours ago 4 hours ago -- Listen Share I recently spent a few weeks running a conference for a community of researchers and writers in a historic chateau in the French countryside. During this time, I also examined the history of the building and how texture, size and proportionality affected thinking in the space. This experience turned out to be a perfect illustration of how som

Address bar shows hp.com. Browser displays scammers’ malicious text anyway.

Not the Apple page you're looking for “If I showed the [webpage] to my parents, I don't think they would be able to tell that this is fake,” Jérôme Segura, lead malware intelligence analyst at Malwarebytes, said in an interview. “As the user, if you click on those links, you think, ‘Oh I'm actually on the Apple website and Apple is recommending that I call this number.’” The unknown actors behind the scam begin by buying Google ads that appear at the top of search results for Microsoft, Apple,

iOS 18.6 now available in beta, plus macOS 15.6, more [U: Public betas]

Last week Apple debuted its major new software versions coming this fall, including iOS 26, iPadOS 26, and more. But it isn’t finished with the current software cycle just yet, as the first betas for iOS 18.6, macOS 15.6, and more have now arrived. Update 6/18/25: Public beta versions are now rolling out too, a couple days after the developer releases arrived. Inside Apple, the vast majority of software engineers’ time has been dedicated, likely for a while now, to preparing iOS 26 and the oth

Topics: 18 apple ios new software

The best graphic design software of 2025: Feature-packed, professional tools

Whether you're a student just starting your graphic design journey or you're a seasoned professional, you won't get far without the right tools. We've moved on from the early days of classic Adobe Photoshop and Corel, and while these software suites are now modern and valuable in their own right, there is a multitude of graphic design packages out there for you to choose from. Windows, Mac, tablets, or even smartphones -- no matter the device, there's software out there for you. Some are focus

ChainLink Phishing: How Trusted Domains Become Threat Vectors

Phishing remains one of cybersecurity’s most enduring threats, not because defenders aren’t evolving, but because attackers are adapting even faster. Today’s most effective campaigns aren’t just built on spoofed emails or shady domains. They exploit something far more insidious: trust in the tools and services we use every day, leading to zero-hour phishing. The Rise of ChainLink Phishing Traditional phishing relied on easily identifiable red flags such as suspicious senders and questionable

Paddle settles for $5 million over facilitating tech support scams

Paddle.com and its U.S. subsidiary will pay $5 million to settle Federal Trade Commission (FTC) allegations that the company facilitated deceptive tech-support schemes that harmed many U.S. consumers, including older adults. Paddle, a UK-based payment processor, offers payments, tax handling, compliance, and checkout infrastructure for software and digital product sellers by acting as a "merchant of record." According to the FTC, Paddle failed to perform adequate screening and fraud prevention

The 56 Best Shows on Disney+ Right Now (June 2025)

Disney+, if you didn’t know, isn’t just for kids. With its ownership of the Lucasfilm brand and the Marvel titles, the streaming service offers plenty of grown-up content in its bid to compete with Netflix and Amazon—and we’re not just talking movies. Since launching the service, Disney has used the name recognition of Star Wars and Marvel to launch scores of TV shows, from The Mandalorian to Loki. In the list below, we’ve collected the ones we think are the best to watch, from those franchises

IEEE Computer Society Announces André Seznec as the 2025 ACM-IEEE CS Eckert-Mauchly Award Recipient

Seznec is recognized for seminal work in branch prediction and cache memories LOS ALAMITOS, Calif., 17 June 2025 – The IEEE Computer Society (CS) is pleased to announce the recipient of the 2025 ACM-IEEE CS Eckert-Mauchly Award: André Seznec, SiFive Fellow on leave from INRIA/IRISA. The award honors Seznec’s extensive impact on computing, most notably his pioneering contributions to branch prediction and cache memories. “André Seznec is a luminary in computer architecture,” said Hironori Washi

Cybersecurity takes a big hit in new Trump executive order

Cybersecurity practitioners are voicing concerns over a recent executive order issued by the White House that guts requirements for: securing software the government uses, punishing people who compromise sensitive networks, preparing new encryption schemes that will withstand attacks from quantum computers, and other existing controls. The executive order (EO), issued on June 6, reverses several key cybersecurity orders put in place by President Joe Biden, some as recently as a few days before

Applied Intuition raises $600M as it pushes further into defense

Buzzy autonomous vehicle software company Applied Intuition has closed a $600 million Series F and tender offer, pushing its valuation up to $15 billion. The round was co-led by BlackRock-managed funds and Kleiner Perkins, and included new investments from the Qatar Investment Authority, Abu Dhabi Investment Council, Greycroft, and more. Existing investors General Catalyst, Lux, Elad Gil, and Mary Meeker’s growth fund Bond also participated. Applied Intuition’s raise comes just one year after

New Veeam RCE flaw lets domain users hack backup servers

​Veeam has released security updates today to fix several Veeam Backup & Replication (VBR) flaws, including a critical remote code execution (RCE) vulnerability. Tracked as CVE-2025-23121, this security flaw was reported by security researchers at watchTowr and CodeWhite, and it only impacts domain-joined installations. As Veeam explained in a Tuesday security advisory, the vulnerability can be exploited by authenticated domain users in low-complexity attacks to gain code execution remotely on

Reverse-engineered PlayStation 1 motherboard runs original chips without emulation

Why it matters: Preserving retro games and hardware becomes increasingly difficult as the years pass and essential components grow rarer. Reverse engineering allows modders and repair shops to create substitutes that function identically to the original parts. Now, a new project aims to bring that level of flexibility to the original PlayStation. Italian engineer Lorentio Brodesco recently became the first person to successfully reverse-engineer the original PlayStation's motherboard, creating

Security Bite: Infostealer malware spikes 28% among Mac users, says Jamf

9to5Mac Security Bite is exclusively brought to you by Mosyle, the only Apple Unified Platform. Making Apple devices work-ready and enterprise-safe is all we do. Our unique integrated approach to management and security combines state-of-the-art Apple-specific security solutions for fully automated Hardening & Compliance, Next Generation EDR, AI-powered Zero Trust, and exclusive Privilege Management with the most powerful and modern Apple MDM on the market. The result is a totally automated Appl

The best antivirus software of 2025

Cyber threats are constantly evolving. While most devices come with built-in antivirus software, these programs may not offer comprehensive protection. A dedicated antivirus program detects threats like phishing, ransomware, trojans, and worms. The service will also alert you when you visit suspicious websites, try to download or execute potentially malicious software, or if malware otherwise finds its way to your system. You can also perform regular scans to remove threats from your system with

Tony Gilroy Created His Own ‘Star Wars’ Endings and Aimed for ‘Legit Hope’

When Tony Gilroy and his Andor star Diego Luna decided to cram half a decade’s worth of new Star Wars lore into three episodes per year leading up to the events of Rogue One, they knew the task was unbelievably ambitious. In a chat with the Wrap, Gilroy expressed the excitement everyone involved felt over their great big heist of an entry into Lucasfilm’s Star Wars lore. “We kept waiting for it to fail, going, ‘There must be something that’s going to bite us here.’ We kept waiting for a bugaboo

New Anubis ransomware can encrypt and destroy data, making file recovery impossible

WTF?! Being affected by a dangerous ransomware operation is bad enough, but at least you might have a chance to recover your files somehow. A recently discovered ransomware strain is making things even trickier by offering a new wiping option that allows affiliate criminals to completely destroy data after encryption. Security researchers have discovered a new Ransomware-as-a-Service campaign with highly destructive potential. Anubis has only been around for a few months and fortunately, hasn't

The Future of ‘Star Wars’ May Not Be as Connected as We Expect

One of the best, and worst, things about Star Wars in recent years is just how connected everything has been. It meant characters who may have at first seemed tangential, like Cassian Andor in Rogue One, could be greatly expanded in something like Andor. It also meant audiences who had never watched an animated show like Clone Wars or Rebels might be left confused with the stories in something like Ahsoka. In those cases and others, there always seemed to be some kind of guardrails on what was p

ASUS Armoury Crate bug lets attackers get Windows admin privileges

A high-severity vulnerability in ASUS Armoury Crate software could allow threat actors to escalate their privileges to SYSTEM level on Windows machines. The security issue is tracked as CVE-2025-3464 and received a severity score of 8.8 out of 10. It could be exploited to bypass authorization and affects the AsIO3.sys of the Armoury Crate system management software. Armoury Crate is the official system control software for Windows from ASUS, providing a centralized interface to control RGB li

I replaced my monitor with a 34-inch ultrawide OLED for a week - here's my buying advice

ZDNET's key takeaways The Alienware 34 240Hz QD-OLED Gaming Monitor retails for $800 It is a large, 34-inch curved gaming monitor with impressive visual output and an immersive design Be aware that this display does not come with internal speakers. View now at Dell View now at Amazon more buying choices For the longest time, I considered curved monitors to be nothing more than a gimmick like 3D TVs (remember those?). But over the years and through personal experience, I've learned that these

iOS 18.6 now available in beta, plus macOS 15.6 and more

Last week Apple debuted its major new software versions coming this fall, including iOS 26, iPadOS 26, and more. But it isn’t finished with the current software cycle just yet, as the first betas for iOS 18.6, macOS 15.6, and more have now arrived. Inside Apple, the vast majority of software engineers’ time has been dedicated, likely for a while now, to preparing iOS 26 and the other new OS versions. However, the company isn’t quite done with the current OS lineup. iOS 18 and its companion re

Topics: 18 apple ios new software

Stray Kite Studios poised for Wartorn early access release on June 17

Stray Kite Studios is launching its Wartorn game into early access on Steam and the Epic Games Store tomorrow on June 17. The real-time tactics title will be available for $29.99. There will also be a special launch week discount where the game can be purchased for $19.99. Wartorn’s development is led by Creative Director Paul Hellquist (lead designer on BioShock and creative director on Borderlands 2), who brings his exceptional expertise into crafting a fresh new take on tactical gaming. Pla

iOS 26 SDK offers strongest hint yet at a foldable iPhone

Apple’s WWDC sessions usually offer a mix of developer guidance and subtle hardware tea leaves. And last week, one passing comment during the explanation of an SDK change caught attention for what it might suggest about a particular future device. In a session called “Make your UIKit app more flexible,” Apple confirmed that starting with the iOS 26 SDK, apps will no longer be automatically letterboxed or scaled on new screen sizes when running on future hardware. Historically, when Apple intro

Siri vaporware dispute continues, as high-profile commenters hit back at Apple

Apple may have belatedly responded to accusations of showing off Siri vaporware at last year’s WWDC, but the controversy is showing no sign of dying down anytime soon. John Gruber – author of the original piece taking issue with Apple showing off features it hadn’t demonstrated to anyone outside the company – is now joined by M.G. Siegler and others … How it started Apple showed off some extremely impressive-looking new-Siri features at last year’s WWDC, doubling down on these in an ad for th

Meta-analysis of three different notions of software complexity

A meta-analysis of three different notions of software complexity I want to discuss three different notions of software complexity: Rich Hickey’s notion of complexity, as explained in his talk Simple Made Easy. John Ousterhout’s notion of complexity, as explained in his book A Philosophy of Software Design. Zach Tellman’s notion of complexity, as explained in his newsletter Explaining Software Design. I’ve picked these three because I’ve found them to be at least somewhat coherent, and the

Anubis ransomware adds wiper to destroy files beyond recovery

The Anubis ransomware-as-a-service (RaaS) operation has added to its file-encryptimg malware a wiper module that destroys targeted files, making recovery impossible even if the ransom is paid. Anubis (not to be confused with the same-name Android malware with a ransomware module) is a relatively new RaaS first observed in December 2024 but became more active at the beginning of the year. On February 23, the operators announced an affiliate program on the RAMP forum. A report from KELA at the

What Is Open Source?

I published a version of this article on Medium eight years ago. This version is updated with new references and arguments. Over the last few years, I’ve been a part of lots of discussions — across domains, from technology to journalism and education — about Silicon Valley and how technology business models are affecting other industries. Outside technology industry circles, there’s lots of talk about how open source software is a more respectful model. What’s missing from many of these discus

Saab achieves AI milestone with Gripen E

Saab, in collaboration with Helsing, today announced the successful completion of the first three flights integrating Helsing’s Artificial Intelligence (AI) agent ‘Centaur’ into a Gripen E fighter jet. As part of Saab’s ‘Project Beyond’, the flights, where the first flight, was conducted on May 28, mark a significant advance in bringing AI capabilities to military aircraft. It is also yet another proof point of Gripen E´s unparalleled ability to rapidly update software without disregarding safet

RISC-V in AI and HPC Part 1: Per Aspera Ad Astra?

//php echo do_shortcode('[responsivevoice_button voice="US English Male" buttontext="Listen to Post"]') ?> —First in a three-part series Introduced in 2014, the RISC-V instruction set architecture has been evolving at a pace that Arm and x86 ISAs have never experienced. Initially, RISC-V cores were used solely for microcontrollers and applications that did not require high performance, but rather benefited from low cost and low power. Since RISC-V is an open-source architecture, it quickly gai

Topics: ai hpc risc said software