Latest Tech News

Stay updated with the latest in technology, AI, cybersecurity, and more

Filtered by: data Clear Filter

Memory Efficiency in iOS: Reducing footprint and beyond

Previously, we explored how memory is measured and what tools are available for inspecting usage in iOS apps. Now, let’s shift our focus to reducing memory consumption using a set of practical techniques and development best practices. But first let’s discuss different approaches to treat this problem. Initial Source of a Problem Every spike in memory has a cause, and memory optimization is no exception. Sometimes it’s a 3rd-party library — Lottie is a classic example, especially if you export

Researcher threatens X with lawsuit after falsely linking him to French probe

Elon Musk's X is refusing to hand over data to French authorities, claiming it's defending its users' free speech and privacy while branding a criminal investigation into alleged algorithm manipulation as "politically motivated." In a post on Monday, X's Global Government Affairs account denied the allegations, insisting the French investigation "egregiously undermines X’s fundamental right to due process and threatens our users’ rights to privacy and free speech." Preparing to fight the alleg

We made Postgres writes faster, but it broke replication

We Made Postgres Writes Faster, but it Broke Replication +2 By Stu Hood, Ming Ying, Mathew Pregasen, and Olive Ratliff on June 30, 2025 When we built pg_search , the Postgres extension for search and analytics, write throughput was a priority. To be an effective alternative to Elasticsearch we needed to support high ingest workloads in real time. This is because many Elasticsearch use cases — like real-time dashboards, e-commerce search, and recommendation systems — involve continuous writes t

This ‘violently racist’ hacker claims to be the source of The New York Times’ Mamdani scoop

is a reporter who writes about tech, money, and human behavior. She joined The Verge in 2014 as science editor. Previously, she was a reporter at Bloomberg. The ultimate source for The New York Times’ story about Zohran Mamdani’s college application is an open secret. It’s an anime-loving neo-Nazi whose hobbies include furry drawings, posting fan art of a video game character, and hacking universities. On X, the alleged hacker is followed by New York Times freelancer Benjamin Ryan, who was the

Musk's X refuses to hand over data in 'politically motivated' French investigation

Elon Musk's X on Monday denied allegations made by French authorities as part of a criminal investigation into alleged data tampering, adding that it would not submit to the prosecutor's demand to hand over data. X's global government affairs account said the French investigation, which ramped up this month, is "politically-motivated" and designed to "restrict free speech." "French authorities have launched a politically-motivated criminal investigation into X over the alleged manipulation of

Apple details how it trained its new AI models: 4 interesting highlights

During WWDC25, Apple announced new versions of its on-device and cloud-based foundation models. Now, they have published a tech report detailing how those models were trained, optimized, and evaluated. And the report includes some genuinely interesting under-the-hood tidbits. In a comprehensive document called “Apple Intelligence Foundation Language Models – Tech Report 2025“, the company walks through multiple aspects of the new models, including their architecture, data sources, pre-training,

Musk's X refuses to hand over data in 'politically-motivated' French investigation

Elon Musk's X on Monday denied allegations made by French authorities as part of a criminal investigation into alleged data tampering, adding that it would not submit to the prosecutor's demand to hand over data. X's global government affairs account said the French investigation, which ramped up this month, is "politically-motivated" and designed to "restrict free speech." "French authorities have launched a politically-motivated criminal investigation into X over the alleged manipulation of

British government set to back down on secret iCloud backdoor after US pressure

We learned earlier this year that the British government had secretly ordered Apple to create a backdoor into encrypted data for all iCloud users worldwide. Specifically, it wanted a way to see personal data protected by Apple’s introduction of Advanced Data Protection (ADP), which extended end-to-end encryption to almost all iCloud data, meaning not even the iPhone maker could access it. Apple has been fighting the secret order in secret court hearings, but it now appears that the US governmen

Dell confirms breach of test lab platform by World Leaks extortion group

A newly rebranded extortion gang known as "World Leaks" breached one of Dell's product demonstration platforms earlier this month and is now trying to extort the company into paying a ransom. Dell acknowledged the incident to BleepingComputer, confirming that the threat actor had breached its Customer Solution Centers platform, which is used to demonstrate Dell products and solutions to customers. "A threat actor recently gained access to our Solution Center, an environment designed to demonst

Over 1,000 CrushFTP servers exposed to ongoing hijack attacks

Over 1,000 CrushFTP instances currently exposed online are vulnerable to hijack attacks that exploit a critical security bug, providing admin access to the web interface. The security vulnerability (CVE-2025-54309) is due to mishandled AS2 validation and impacts all CrushFTP versions below 10.8.5 and 11.3.4_23. The vendor tagged the flaw as actively exploited in the wild on July 19th, noting that attacks may have begun earlier, although it has yet to find evidence to confirm this. "July 18th,

I Just Discovered a Travel Hack That Can Save You Time and Money on International Trips -- And It's Completely Free

Debalina Ghosh/Getty Images I've been traveling around the world for a year and a half, and one of my favorite money-saving travel hacks is using an eSIM. If you're unfamiliar with the concept of an eSIM, it's a digital SIM installed onto your phone that lets you access a mobile network without a physical SIM card. Using an eSIM for all my mobile data abroad means I don't have to worry about expensive roaming charges from my US mobile provider or buying a physical SIM for a local network every

Here’s how Apple Intelligence keeps privacy in mind versus the competition

Artificial intelligence has obviously been the industry craze for the past couple years. While large language models are incredibly capable, they’ve always come with a bit of a compromise: privacy. Ultimately, you’re still using a model hosted in the cloud, and all of your conversations are stored on some server. Apple’s always had privacy at the core of its products – so in the months leading up to the debut of Apple’s AI features, many people wondered: how would Apple handle it? Today, we del

5 tips for building foundation models for AI

imaginima/Getty Many businesses are just beginning to grapple with the impact of artificial intelligence, but some have been using machine learning (ML) and other emerging technologies for over a decade. Also: Most AI projects are abandoned - 5 ways to ensure your data efforts succeed For Manish Jethwa, CTO at Ordnance Survey (OS), the UK's national mapping service, the priority is to combine his organization's AI and ML experiences with recent advances in generative AI to refine, distribute,

Topics: ai data models os said

Digital vassals? French Government ‘exposes citizens’ data to US'

France’s deepening reliance on US tech giants is raising alarms about digital sovereignty and exposing public data to foreign jurisdictions. In a French Senate report on economic and digital sovereignty, Senators accused the French State of “political fault”. That was in regard to outsourcing essential data infrastructure to US companies subject to US extraterritorial laws, including Microsoft, despite repeated warnings and alternatives. “France is subject to US extraterritorial law,” the repo

Digital vassals? French Government 'exposes citizens' data to US'

France’s deepening reliance on US tech giants is raising alarms about digital sovereignty and exposing public data to foreign jurisdictions. In a French Senate report on economic and digital sovereignty, Senators accused the French State of “political fault”. That was in regard to outsourcing essential data infrastructure to US companies subject to US extraterritorial laws, including Microsoft, despite repeated warnings and alternatives. “France is subject to US extraterritorial law,” the repo

AI Data Centers Accused of Creating Major Problems for Local Water Systems

After Meta started building an enormous data center less than 400 yards away from their house, a couple living in Newton County, Georgia, says their water started to dry up. That began in 2018; years later, two of their bathroom taps still don't work. What water remains has turned into a gritty sludge, littered with sediments. So far, Beverly Morris and her husband Jeff have spent $5,000 on their water problems, they told the New York Times in a new interview, and can't afford to replace their

Piramidal (YC W24) is hiring a full stack engineer

We are looking for a software engineer to help us enable interactions and automations with Piramidal’s newest technologies. We value proactive, customer-centric engineers who prioritize foundational details (data models, architecture, security) to enable excellent products. In this role you will: Build and maintain the infrastructure and backend systems for our flagship platform focused on neural data. Collaborate closely with ML engineers to iterate on applying our latest models. and Work w

Make Your Own Backup System – Part 1: Strategy Before Scripts

Backup: Beyond the Simple Copy For as long as I can remember, backup is something that has been underestimated by far too many people. Between flawed techniques, "Schrödinger's backups" (i.e., never tested, thus both valid and invalid at the same time), and conceptual errors about what they are and how they work (RAID is not a backup!), too much data has been lost due to deficiencies in this area. Nowadays, backup is often an afterthought. Many rely entirely on "the cloud" without ever asking

A CarFax for Used PCs: Hewlett Packard wants to give old laptops new life

The United Nations’ Global E-waste Monitor estimates that the world generates over 60 million tonnes of e-waste annually. Furthermore, this number is rising five times as fast as e-waste recycling. Much of this waste comes from prematurely discarded electronic devices. Many enterprises follow a standard three-year replacement cycle, assuming older computers are inefficient. However, many of these devices are still functional and could perform well with minor upgrades or maintenance. The issue i

Best Internet Providers in Charleston, South Carolina

What is the best internet provider in Charleston? CNET's top choice for internet providers in Charleston is AT&T Fiber. With plans starting at $55 a month and fast speeds, reliable service, it's a no brainer. But even if AT&T Fiber isn’t in your neighborhood, you’ve still got great alternatives. This includes Home Telecom and options from Xfinity and Spectrum. Prefer wireless? T-Mobile and Verizon both offer dependable 5G home internet across the city. Charleston stands out for its broadband a

For privacy and security, think twice before granting AI access to your personal data

AI is being forced on us in pretty much every facet of life, from phones and apps to search engines and even drive-throughs, for some reason. The fact that we’re now getting web browsers with baked-in AI assistants and chatbots shows that the way some people are using the internet to seek out and consume information today is very different from even a few years ago. But AI tools are more and more asking for gross levels of access to your personal data under the guise of needing it to work. This

Microsoft Office is using an artificially complex XML schema as a lock-in tool

Thank you for visiting our website and your interest in our services and products. As the protection of your personal data is an important concern for us, please click on the "More information" link to access our Privacy Policy page - which will open in a separate browser tab - where we explain what information we collect during your visit to our website, how it is processed, and whether or how it may be used. Once you have carefully read our Privacy Policy page, close the browser tab to return

China’s Salt Typhoon Hackers Breached the US National Guard for Nearly a Year

After reporting last week that the “raw” Jeffrey Epstein prison video posted by the FBI was likely modified in at least some ways (though there is no evidence that the footage was deceptively manipulated), WIRED reported on Tuesday that metadata analysis of the video shows approximately 2 minutes and 53 seconds were removed from one of two stitched-together clips. The United States Department of Homeland Security is facing controversy over DNA samples taken from approximately 133,000 migrant ch

How to write Rust in the Linux kernel: part 3

How to write Rust in the kernel: part 3 [LWN subscriber-only content] Welcome to LWN.net The following subscription-only content has been made available to you by an LWN subscriber. Thousands of subscribers depend on LWN for the best news from the Linux and free software communities. If you enjoy this article, please consider subscribing to LWN. Thank you for visiting LWN.net! The interfaces between C and Rust in the kernel have grown over time; any non-trivial Rust driver will use a number of

AI capex is so big that it's affecting economic statistics

AI capex is so big that it's affecting economic statistics, boosting the economy, and beginning to approach the railroad boom As ever, here is what's ahead: Updates on prior pieces My most recent Rough Notes essay A few things worth reading I previously wrote about the perils of building renovation as a Fed chair, especially given an administration bent on finding a reason to fire you "for cause." As anyone who has renovated anything larger than a dog house knows, no one thinks what you spent

AI CapEx Is Eating the Economy

AI capex is so big that it's affecting economic statistics, boosting the economy, and beginning to approach the railroad boom As ever, here is what's ahead: Updates on prior pieces My most recent Rough Notes essay A few things worth reading I previously wrote about the perils of building renovation as a Fed chair, especially given an administration bent on finding a reason to fire you "for cause." As anyone who has renovated anything larger than a dog house knows, no one thinks what you spent

ICE is getting unprecedented access to Medicaid data

Immigration and Customs Enforcement officials are getting access to the personal data of nearly 80 million people on Medicaid in order to acquire "information concerning the identification and location of aliens in the United States,” according to an information exchange agreement viewed by WIRED. The agreement, which is titled “Information Exchange Agreement Between the Centers for Medicare and Medicaid Services and the Department of Homeland Security (DHS) for Disclosure of Identity and Locat

ICE Is Getting Unprecedented Access to Medicaid Data

Immigration and Customs Enforcement officials are getting access to the personal data of nearly 80 million people on Medicaid in order to acquire "information concerning the identification and location of aliens in the United States,” according to an information exchange agreement viewed by WIRED. The agreement, which is titled “Information Exchange Agreement Between the Centers for Medicare and Medicaid Services and the Department of Homeland Security (DHS) for Disclosure of Identity and Locat

The IRS Is Building a Vast System to Share Millions of Taxpayers’ Data With ICE

This story was originally published by ProPublica. ProPublica is a Pulitzer Prize-winning investigative newsroom. Sign up for The Big Story newsletter to receive stories like this one in your inbox. The Internal Revenue Service is building a computer program that would give deportation officers unprecedented access to confidential tax data. ProPublica has obtained a blueprint of the system, which would create an “on demand” process allowing Immigration and Customs Enforcement to obtain the ho

Salesforce used AI to cut support load by 5% — but the real win was teaching bots to say ‘I’m sorry’

Want smarter insights in your inbox? Sign up for our weekly newsletters to get only what matters to enterprise AI, data, and security leaders. Subscribe Now Salesforce has crossed a significant threshold in the enterprise AI race, surpassing 1 million autonomous agent conversations on its help portal — a milestone that offers a rare glimpse into what it takes to deploy AI agents at massive scale and the surprising lessons learned along the way. The achievement, confirmed by company executives