Latest Tech News

Stay updated with the latest in technology, AI, cybersecurity, and more

Filtered by: format Clear Filter

HR Giant Workday Got Hacked

Workday, a company that provides human resources technology to over 11,000 corporations and 70 million users worldwide, announced in a classic Friday news dump that it suffered a data breach. The company did not disclose how much information was stolen by the hackers, but did reveal that information—including the names, email addresses, and phone numbers—of some users was compromised. The company said the breach hit some of its third-party customer relationship databases. If any other data was

Workday says hackers used social engineering to access personal data during a breach

Human resources technology company Workday has confirmed that a data breach has affected its third-party CRM platform. In a blog post announcing the breach, the company said that a social engineering campaign had targeted its employees, with threat actors posing as IT or HR in order to trick employees into sharing account access or personal information. The company says that while the threat actors were able to access some information from the CRM, there is no indication of any access to custom

The Cutaway Illustrations of Fred Freeman

During the two-year research for our book LOOK INSIDE we discovered many amazing illustrations and artists that, for one reason or another, did not make it into the final version of the book. It would be a pity to leave these forgotten on a drawer, so during the next few weeks we will present here some of these masters of the cutaway. A while ago we wrote here about Frank Soltesz, an American illustrator active from the 30’s to the 60’s, and author of a marvelous series of architectural cutaw

HR giant Workday discloses data breach after Salesforce attack

Human resources giant Workday has disclosed a data breach after attackers gained access to a third-party customer relationship management (CRM) platform in a recent social engineering attack. Headquartered in Pleasanton, California, Workday has over 19,300 employees in offices across North America, EMEA, and APJ. Workday's customer list comprises over 11,000 organizations across a diverse range of industries, including more than 60% of the Fortune 500 companies. As the company revealed in a Fr

HR giant Workday discloses data breach amid Salesforce attacks

Human resources giant Workday has disclosed a data breach after attackers gained access to a third-party customer relationship management (CRM) platform in a recent social engineering attack. Headquartered in Pleasanton, California, Workday has over 19,300 employees in offices across North America, EMEA, and APJ. Workday's customer list comprises over 11,000 organizations across a diverse range of industries, including more than 60% of the Fortune 500 companies. As the company revealed in a Fr

EasyPost (YC S13) Is Hiring

We want to ensure your safety and protect you from potential scams. Recently, there have been fraudulent recruitment initiatives online that impersonate our company. These scams aim to deceive unsuspecting applicants by offering nonexistent positions and requesting personal information or upfront fees. Remember that our company does not endorse any job postings outside our official channels. If you encounter a suspicious offer, report it through the job platform on which you found it or report

Meta accessed women's health data from Flo app without consent, says court

A jury has ruled that Meta accessed sensitive information from a woman’s reproductive health tracking app without consent. The app in question is called Flo Health. Developed in 2015 in Belarus to track menstrual cycles, it has evolved over the years as a tracking app for highly detailed, intimate aspects of women’s reproductive health. Flo Health user Erica Frasco bought a class action lawsuit against the company in 2021, following a damning report about its privacy infractions by the Wall St

Data Brokers Face New Pressure for Hiding Opt-Out Pages From Google

United States senator Maggie Hassan is pressing major data brokers after an investigation by The Markup/CalMatters and copublished by WIRED found at least 35 firms hid opt-out information from search results, making it harder for people to take control of their own data and safeguard their privacy online. Hassan, the top Democrat on the Joint Economic Committee, put five of the top firms—IQVIA Digital, Comscore, Telesign Corporation, 6sense Insights, and Findem—on notice Wednesday, demanding th

Manpower discloses data breach affecting nearly 145,000 people

Manpower, one of the world's largest staffing companies, is notifying nearly 145,000 individuals that their information was stolen by attackers who breached the company's systems in December 2024. Together with Experis and Talent Solutions, the company is part of ManpowerGroup, a multinational corporation with over 600,000 workers in more than 2,700 offices and serving over 100,000 clients worldwide. Last year, ManpowerGroup reported revenues of $17.9 billion and a total gross profit of $3.1 bi

All known 49-year-old Apple-1 computer

If nothing happens, click Loading...If nothing happens, click here Notes = location, = batch, numbers/stamps/labels, = verification status, = picture and video count, = available history, = auctions. 'More or less verified': To the best of our knowledge and belief, evidence is almost given or obvious. Many times the current owner is unknown, pictures might be old, etc.! Unlisted Apple-1: The Apple-1 Registry is in contact with some owners who wish to have no information published. We respe

Don't fall for AI-powered disinformation attacks online - here's how to stay sharp

JuSun/Getty Images ZDNET's key takeaways AI-powered narrative attacks, or misinformation campaigns, are on the rise. These can create real business, brand, personal, and financial harm. Here are expert tips on how to spot and protect yourself against them. Last month, an old friend forwarded me a video that made my stomach drop. In it, what appeared to be violent protesters streaming down the streets of a major city, holding signs accusing the government and business officials of "censoring

Scientists hid secret codes in light to combat video fakes

It's easier than ever to manipulate video footage to deceive the viewer and increasingly difficult for fact checkers to detect such manipulations. Cornell University scientists developed a new weapon in this ongoing arms race: software that codes a "watermark" into light fluctuations, which in turn can reveal when the footage has been tampered with. The researchers presented the breakthrough over the weekend at SIGGRAPH 2025 in Vancouver, British Columbia, and published a scientific paper in Jun

POML: Prompt Orchestration Markup Language

POML: Prompt Orchestration Markup Language POML (Prompt Orchestration Markup Language) is a novel markup language designed to bring structure, maintainability, and versatility to advanced prompt engineering for Large Language Models (LLMs). It addresses common challenges in prompt development, such as lack of structure, complex data integration, format sensitivity, and inadequate tooling. POML provides a systematic way to organize prompt components, integrate diverse data types seamlessly, and

Microsoft POML – Prompt Orchestration Markup Language

POML: Prompt Orchestration Markup Language POML (Prompt Orchestration Markup Language) is a novel markup language designed to bring structure, maintainability, and versatility to advanced prompt engineering for Large Language Models (LLMs). It addresses common challenges in prompt development, such as lack of structure, complex data integration, format sensitivity, and inadequate tooling. POML provides a systematic way to organize prompt components, integrate diverse data types seamlessly, and

Lurk – A Turing-complete programming language for ZK-SNARKs

Lurk Overview Lurk is a statically scoped dialect of Lisp, influenced by Scheme and Common Lisp. A reference implementation focused on describing and developing the core language can be found in the lurk-lisp repo. Lurk's distinguishing feature relative to most programming languages is that the correct execution of Lurk programs can be directly proved using SNARKs. The resulting proofs are succinct: they are relatively small, can be verified quickly, and they reveal only the information expli

U.S. Judiciary confirms breach of court electronic records service

The U.S. Federal Judiciary confirms that it suffered a cyberattack on its electronic case management systems hosting confidential court documents and is strengthening cybersecurity measures. The organization stated that, while most documents in the system are public, certain sealed filings contain sensitive information that is now protected with stricter access controls aimed at blocking hackers. "The federal Judiciary is taking additional steps to strengthen protections for sensitive case doc

Columbia University data breach impacts nearly 870,000 individuals

​An unknown threat actor has stolen the sensitive personal, financial, and health information of nearly 870,000 Columbia University current and former students and employees after breaching the university's network in May. Established in 1767 as King's College, Columbia University is a private Ivy League research university with a budget of $6.6 billion in 2024, over 20,000 employees, including 4,700 academic staff, and over 35,000 enrolled students across 19 schools and special programs. The

California jury rules Meta violated privacy law in case involving period-tracking app

A California jury ruled against Meta in a privacy-related lawsuit involving the alleged collection of sensitive data from Flo, a period-tracking app. The jury ruled that the plaintiffs proved that Meta violated the California Invasion of Privacy Act, according to a verdict form filed Friday in the U.S. District Court for Northern District of California. The ruling stems from a class-action lawsuit dating back to 2021 against the health-tech company Flo Health and other businesses like Meta, Go

Scientists have recreated the Universe's first molecule

Immediately after the Big Bang, which occurred around 13.8 billion years ago, the universe was dominated by unimaginably high temperatures and densities. However, after just a few seconds, it had cooled down enough for the first elements to form, primarily hydrogen and helium. These were still completely ionized at this point, as it took almost 380,000 years for the temperature in the universe to drop enough for neutral atoms to form through recombination with free electrons. This paved the way

Inside the US Government's Unpublished Report on AI Safety

At a computer security conference in Arlington, Virginia, last October, a few dozen AI researchers took part in a first-of-its-kind exercise in “red teaming,” or stress-testing a cutting-edge language model and other artificial intelligence systems. Over the course of two days, the teams identified 139 novel ways to get the systems to misbehave including by generating misinformation or leaking personal data. More importantly, they showed shortcomings in a new US government standard designed to h

I built a tool to help people remove their info from the Tea App

From: To: [email protected], [email protected] Copy Subject: Request for Immediate Removal of Unauthorized Personal Information Copy To Whom It May Concern, My name is . I have discovered that my personal information is being published and distributed through the Tea Dating Advice app without my knowledge or consent. This includes a post referencing me. This anonymous and unverified content violates my right to privacy, and I am requesting the immediate removal of any

PBS confirms data breach after employee info leaked on Discord servers

PBS has suffered a data breach exposing the corporate contact information of its employees and those of its affiliates, BleepingComputer has learned. Earlier this month, BleepingComputer was alerted to a file circulated on Discord servers that allegedly contained this information. This data was not distributed on dark web sites, hacking forums, or other mediums frequented by threat actors. Instead, it was being shared on Discord servers for fans of "PBS Kids," where young adults, teenagers, an

Voice phishers strike again, this time hitting Cisco

Cisco said that one of its representatives fell victim to a voice phishing attack that allowed threat actors to download profile information belonging to users of a third-party customer relationship management system. “Our investigation has determined that the exported data primarily consisted of basic account profile information of individuals who registered for a user account on Cisco.com,” the company disclosed. Information included names, organization names, addresses, Cisco assigned user I

Can you block it? A simple Ad Block Tester

Can You Block It was built to help you test if your ad-blocker is working as intended. The various tests help you in identifying what formats of advertisements are blocked or unblocked so that you can understand your ad-blockers effectiveness. Use the various tests to test ad-blockers such as AdBlock, AdBlock Plus, AdBlocker Ultimate, AdGuard, Ghostery, uBlock Origin, Pi-Hole, NoScript and more with various ad formats such as Web Banners, Native Ads, Pop-Unders, In-Page Push Ads, etc from popula

Cisco discloses data breach impacting Cisco.com user accounts

Cisco has disclosed that cybercriminals stole the basic profile information of users registered on Cisco.com following a voice phishing (vishing) attack that targeted a company representative. After becoming aware of the incident on July 24th, the networking equipment giant discovered that the attacker tricked an employee and gained access to a third-party cloud-based Customer Relationship Management (CRM) system used by Cisco. This allowed the threat actor to steal the personal and user infor

Could Apple create an AI search engine to rival Gemini and ChatGPT? Here's how it could succeed

Sabrina Ortiz/ZDNET ZDNET's key takeaways Apple reportedly has an AI search in the works. The AI search experience could have a standalone app and power Siri. Timely and strategic release with broader success of AI search engines. With the launch of Apple Intelligence, Apple sought to enter the AI space after a somewhat late entry. However, several delays of its most sought-after feature, including Siri 2.0, have made it difficult to keep up with more established competitors. A new report d

EHRs: The hidden distraction in your doctor's office

Cheryl Conrad no longer seethes with the frustration that threatened to overwhelm her in 2006. As described in IEEE Spectrum, Cheryl’s husband, Tom, has a rare genetic disease that causes ammonia to accumulate in his blood. At an emergency room visit two decades ago, Cheryl told the doctors Tom needed an immediate dose of lactulose to avoid going into a coma, but they refused to medicate him until his primary doctor confirmed his medical condition hours later. Making the situation more vexing w

Mystery packages with QR codes spark new wave of scams

Serving tech enthusiasts for over 25 years.TechSpot means tech analysis and advice you can trust WTF?! A new twist on package-related scams is drawing concern from federal authorities, as the FBI warns Americans to be vigilant when receiving unexpected parcels containing QR codes. According to a recent alert, criminals have begun exploiting the ubiquity of QR codes as a tool for financial fraud and identity theft. The scheme unfolds when an individual receives a package that's addressed to the

Ongoing Lean formalisation of the proof of Fermat's Last Theorem

Fermat's Last Theorem An ongoing multi-author open source project to formalise a proof of Fermat's Last Theorem in the Lean theorem prover. Information about the project The project is currently being led by Kevin Buzzard. Until September 2029 it is being funded by grant EP/Y022904/1, awarded by the EPSRC. The project is hosted at Imperial College London. Kevin would like to extend many many thanks to both of these institutions for their ongoing support of this nonstandard research. General

Thousands of private ChatGPT conversations found via Google search after feature mishap

What just happened? Numerous organizations have repeatedly warned ChatGPT users over the years never to share personal information with OpenAI's chatbot. A recent incident involving a now-removed feature reveals that potentially thousands of people disclosed deeply intimate information with ChatGPT and also inadvertently made it discoverable through Google search. OpenAI recently confirmed that it has deactivated an opt-in feature that shared chat histories on the open web. Although the functio