Latest Tech News

Stay updated with the latest in technology, AI, cybersecurity, and more

Filtered by: ck Clear Filter

The Download: how AI is improving itself, and hidden greenhouse gases

Last week, Mark Zuckerberg declared that Meta aims to achieve smarter-than-human AI. He seems to have a recipe for achieving that goal, and the first ingredient is human talent: Zuckerberg has reportedly tried to lure top researchers to Meta Superintelligence Labs with nine-figure offers. The second ingredient is AI itself. Zuckerberg recently said on an earnings call that Meta will focus on building self-improving AI—systems that can bootstrap themselves to higher and higher levels of performa

Opendoor tanks after earnings as CEO thanks new investors for 'increased visibility'

With Opendoor shares up almost fivefold since the beginning of July and trading volumes hitting record levels, CEO Carrie Wheeler thanked investors for their "enthusiasm" on Tuesday's earnings call. "I want to acknowledge the great deal of interest in Opendoor lately and that we're grateful for it," Wheeler said, even as the stock sank more than 20% after hours. "We appreciate your enthusiasm for what we're building, and we're listening intently to your feedback." Prior to its recent surge, Op

The greenhouse gases we’re not accounting for

Researchers around the world set to work unraveling the mystery, reviewing readings from satellites, aircraft, and greenhouse-gas monitoring stations. They eventually spotted a clear pattern: Methane emissions had increased sharply across the tropics, where wetlands were growing wetter and warmer. That created the ideal conditions for microbes that thrive in anaerobic muck, which gobbled up more of the carbon-rich organic matter and spat out more methane as a by-product. (Reduced pollution from

We asked Gemini for a story about the Pixel 10 launch and it hallucinated a bizarre foldable

Stephen Schenck / Android Authority Summer’s been going by so fast, it’s hard to believe that we’re already down to just two weeks to go until Google’s August 20 event, where we’re expecting to see the company introduce the Pixel 10 series, the Pixel Watch 4, and some new Pixel Buds. As that date keeps creeping up on us, we’re learning more and more about what we’re likely to get. Some of it sounds great, like the full-featured Qi2 magnetic charging support, while we’re a little bummed by other

Here’s how deepfake vishing attacks work, and why they can be hard to detect

By now, you’ve likely heard of fraudulent calls that use AI to clone the voice of people the call recipient knows. Often, the result is what sounds like a grandchild, CEO, or work colleague you’ve known for years reporting an urgent matter requiring immediate action, saying wiring money, divulging login credentials, or visiting a malicious website. Researchers and government officials have been warning of the threat for years, with the Cybersecurity and Infrastructure Security Agency saying in

Tornado Cash sold crypto “privacy”; the US saw “money laundering.”

"Crypto mixers" exist because of a peculiar feature of cryptocurrencies—most are fully traceable using their public blockchain ledgers. To provide more privacy to crypto account owners, a mixer will let people toss their crypto into a large pool, where it is "mixed" with other people's crypto. At a later date, each crypto owner can choose to withdraw their money from the pool into a new, anonymous wallet, thus making the movement of the crypto harder to track. Of course, the obfuscation doesn't

How to upgrade your deadbolt with a smart lock - and the one I recommend most

Nuki Smart Lock ZDNET's key takeaways The Nuki Smart Lock is now available for $159 on its own, and $229 when combined with the Keypad 2. This smart lock fits into an existing deadbolt, supports Matter for easy integrations with smart home systems, and features hands-free unlocking. Though innovative, the Nuki smart lock requires a subscription for full remote access; it's also very loud when locking and unlocking, and the Keypad 2 is somewhat slow. $159 at Amazon I'm all for smart home techn

Tornado Cash sold crypto “privacy”; the US saw “money laundering.” A jury isn’t sure what to think.

"Crypto mixers" exist because of a peculiar feature of cryptocurrencies—most are fully traceable using their public blockchain ledgers. To provide more privacy to crypto account owners, a mixer will let people toss their crypto into a large pool, where it is "mixed" with other people's crypto. At a later date, each crypto owner can choose to withdraw their money from the pool into a new, anonymous wallet, thus making the movement of the crypto harder to track. Of course, the obfuscation doesn't

Verizon Promo Offers NFL Sunday Ticket Access at No Extra Cost

It's still the NFL preseason, but ahead of the official 2025-2026 regular season kickoff in September, Verizon, a long-term partner of the league, is offering NFL Sunday Ticket to new and existing mobile and internet customers. You don't even need a paid subscription for YouTube TV or YouTube Primetime Channels. Verizon revived its Sunday Ticket on Us promo on Tuesday, and it will run through Sept. 23, along with an alternative option to get $200 off the sports package for a savings of up to $4

A Single Poisoned Document Could Leak ‘Secret’ Data Via ChatGPT

The latest generative AI models are not just stand-alone text-generating chatbots—instead, they can easily be hooked up to your data to give personalized answers to your questions. OpenAI’s ChatGPT can be linked to your Gmail inbox, allowed to inspect your GitHub code, or find appointments in your Microsoft calendar. But these connections have the potential to be abused—and researchers have shown it can take just a single “poisoned” document to do so. New findings from security researchers Mich

The Real Origin of Cisco Systems (1999)

The following account of the real origins of Cisco Systems, as opposed to the history often recounted in Cisco company literature, was written in 1999 by Tom Rindfleisch. Rindfleisch was Director of the SUMEX-AIM project (1973-1990), under which the software for a powerful Internet router system was developed and widely deployed at Stanford and elsewhere for research purposes. That code found its way, without approval from the original developers, to form the basis of the Cisco router. Tom Rindf

Akira ransomware abuses CPU tuning tool to disable Microsoft Defender

Akira ransomware is abusing a legitimate Intel CPU tuning driver to turn off Microsoft Defender in attacks from security tools and EDRs running on target machines. The abused driver is 'rwdrv.sys' (used by ThrottleStop), which the threat actors register as a service to gain kernel-level access. This driver is likely used to load a second driver, 'hlpdrv.sys,' a malicious tool that manipulates Windows Defender to turn off its protections. This is a 'Bring Your Own Vulnerable Driver' (BYOVD) at

The Real Origin of Cisco Systems

The following account of the real origins of Cisco Systems, as opposed to the history often recounted in Cisco company literature, was written in 1999 by Tom Rindfleisch. Rindfleisch was Director of the SUMEX-AIM project (1973-1990), under which the software for a powerful Internet router system was developed and widely deployed at Stanford and elsewhere for research purposes. That code found its way, without approval from the original developers, to form the basis of the Cisco router. Tom Rindf

The arcane alphabets of Black Sabbath

Source: fontsinuse.com Nick Sherman . License: All Rights Reserved . Black Sabbath’s first four studio albums – Black Sabbath , Paranoid , Master of Reality , and Vol 4 , released in rapid succession between 1970 and 1972 – laid much of the groundwork for the heavy metal movement. While there were other bands playing heavy blues-inspired hard rock at the time, the gloomy, doom-laden stylings of Black Sabbath helped fuel their early success as one of the first – and most influential – heavy meta

Vibe coding the MIT course catalog

I recently left Microsoft to join MIT's Media Arts and Sciences program. The transition brought an immediate problem: how do you navigate course selection when faced with the "unknown unknowns"? You can easily find courses you already know you want learn, i.e. "known unknowns". But discovering courses you never knew existed, courses that might reshape your thinking entirely, requires different tools altogether. MIT's official course catalog runs on what appears to be a CGI script. The technolog

For regulated industries, AWS’s neurosymbolic AI promises safe, explainable agent automation

Want smarter insights in your inbox? Sign up for our weekly newsletters to get only what matters to enterprise AI, data, and security leaders. Subscribe Now AWS is banking on the fact that by bringing its Automated Reasoning Checks feature on Bedrock to general availability, it will give more enterprises and regulated industries the confidence to use and deploy more AI applications and agents. It is also hoping that introducing methods like automated reasoning, which utilizes math-based valida

Vibe Coding the MIT Course Catalog

I recently left Microsoft to join MIT's Media Arts and Sciences program. The transition brought an immediate problem: how do you navigate course selection when faced with the "unknown unknowns"? You can easily find courses you already know you want learn, i.e. "known unknowns". But discovering courses you never knew existed, courses that might reshape your thinking entirely, requires different tools altogether. MIT's official course catalog runs on what appears to be a CGI script. The technolog

Blocking LLMs from your website cuts you off from next-generation search

Why blocking LLMs from your website is dumb John Wang 2 min read · 1 hour ago 1 hour ago -- Listen Share Perplexity was recently accused of scraping sites that had explicitly disallowed LLM crawlers in their robots.txt files. In the wake of that revelation, a wave of how-to guides for blocking large-language-model scraping has surfaced [0]. They’re generally highly vitriolic, with people opposing this on both moral grounds (“AI is stealing your content”) as well as displaying a general distaste

Google search boss says AI isn’t killing search clicks

Google has often bristled at the implication that its obsession with AI search is harming web traffic, and now search head Liz Reid has penned a blog post on the topic. According to Reid, clicks aren't declining, AI is driving more searches, and everything is fine on the Internet. But despite the optimistic tone, the post stops short of providing any actual data to back up those claims. This statement feels like a direct response to a recent Pew Research Center analysis that showed searches wit

Google denies AI search features are killing website traffic

Numerous studies indicate that the shift to AI search features and the use of AI chatbots are killing traffic to publishers’ sites. But Google on Wednesday denied that’s the case, at least in aggregate. Instead, the search giant says that total organic click volume from its search engine to websites has been “relatively stable” year-over-year and that average click quality has slightly increased. “This data is in contrast to third-party reports that inaccurately suggest dramatic declines in agg

Nvidia warns of “disaster” if it has to put kill switch and backdoor in chips

Nvidia said there are no backdoors or kill switches in its chips, denying an accusation from the Chinese government. The company also urged policymakers to reject proposals for backdoors and kill switches. "There are no back doors in NVIDIA chips. No kill switches. No spyware. That's not how trustworthy systems are built—and never will be," Nvidia Chief Security Officer David Reber Jr. wrote in a blog post yesterday. The Cyberspace Administration of China last week said it held a meeting with

The Origin of Cisco Systems

The following account of the real origins of Cisco Systems, as opposed to the history often recounted in Cisco company literature, was written in 1999 by Tom Rindfleisch. Rindfleisch was Director of the SUMEX-AIM project (1973-1990), under which the software for a powerful Internet router system was developed and widely deployed at Stanford and elsewhere for research purposes. That code found its way, without approval from the original developers, to form the basis of the Cisco router. Tom Rindf

This carrier now has a lock system that prevents you from using Developer Options

Ryan Haines / Android Authority TL;DR Cricket’s new device lock makes 2025 or newer Motorola and Cricket-branded phones unusable without an active Cricket SIM or eSIM. The only way around this is to wait six months, after which the phone will be fully unlocked. Developer Options are also blocked until the device is unlocked, so Android enthusiasts who care about this should steer clear. If you thought typical carrier unlock policies were annoying, Cricket’s new Device Unlock system takes thi

How to check for bad blocks on a Linux PC hard drive (and why you shouldn't wait to do it)

Kyle Kucharski/ZDNET I've had it happen before. Back when drives consisted of spinning, magnetic platters, that dreaded "tick" was a sure sign a hard drive was failing. Once upon a nightmare scenario, I waited too late and wound up losing everything on my drive. Sure, I could have recovered that data, but at a pretty high monetary cost. Also: The first 5 Linux commands every new user should learn Since then, I've always been vigilant about checking for bad blocks and sectors on hard drives.

5 command line backup tools every Linux user should use for desktops and servers

Javier Zayas Photography/Getty Images I use Linux for both desktop and server. My preference for a server OS is one without a GUI, which means I have to turn to a lot of command-line tools. In some cases, I prefer to use the same command-line tools for both desktop and server, because it simplifies everything. After all, I don't want to have to learn two different tools for the same job. On top of that, the command-line tools I've included in this list are very powerful and flexible enough to m

Google suffers data breach in ongoing Salesforce data theft attacks

Google is the latest company to suffer a data breach in an ongoing wave of Salesforce CRM data theft attacks conducted by the ShinyHunters extortion group. In June, Google warned that a threat actor they classify as 'UNC6040' is targeting companies' employees in voice phishing (vishing) social engineering attacks to breach Salesforce instances and download customer data. This data is then used to extort companies into paying a ransom to prevent the data from being leaked. In a brief update to

Google suffers data breach in ongoing Salesforce data theft attacks

Google is the latest company to suffer a data breach in an ongoing wave of Salesforce CRM data theft attacks conducted by the ShinyHunters extortion group. In June, Google warned that a threat actor they classify as 'UNC6040' is targeting companies' employees in voice phishing (vishing) social engineering attacks to breach Salesforce instances and download customer data. This data is then used to extort companies into paying a ransom to prevent the data from being leaked. In a brief update to

Jeff Buckley died young but is immortalized in a new documentary

Jeff Buckley captivated an audience of generations with his transcendent voice and soaring guitar. After his untimely passing in 1997 at age 30, he gained posthumous, cult-like status. Never one for the charts, his album Grace has stood the test of time and is listed on Rolling Stone’s 500 Greatest Albums of All Time. His live performances were famous for transforming any space, regardless of size, into an intimate listening experience. And his unfinished demos are something fans have collected

Photo-sharing app Locket is banking on a new celebrity-focused feature to fuel its growth

Locket, the photo-sharing app that allows users to share images with friends that are then displayed on their home screens as widgets, wants to stay on your radar, and it’s enlisting the help of celebrities. Locket emerged as a competitor to BeReal when it launched in 2022, offering a more authentic way to connect with others. The app places a widget on iPhone home screens that updates with the latest pictures added by friends. Users can select up to 20 close friends, creating an intimate space

Here's How to Add a Background to Your Text Chats in iOS 26

The iOS 26 beta brings chat backgrounds to Messages, giving a visual identifier for each chat so you can easily tell if you're messaging the right person or group. It's a nice quality-of-life update that can help you distinguish whether you're texting your family chat or your family chat minus your one uncle you don't get along with. Apple released the first public beta of iOS 26 on July 24, and that beta brought a new Liquid Glass design and other new features to the iPhones of developers and