Latest Tech News

Stay updated with the latest in technology, AI, cybersecurity, and more

Filtered by: ware Clear Filter

Microsoft BASIC for 6502 Microprocessor – Version 1.1

Microsoft BASIC for 6502 Microprocessor - Version 1.1 Historical Significance This assembly language source code represents one of the most historically significant pieces of software from the early personal computer era. It is the complete source code for Microsoft BASIC Version 1.1 for the 6502 microprocessor, originally developed and copyrighted by Microsoft in 1976-1978. Why This Document is Historically Important 1. Foundation of the Personal Computer Revolution This BASIC interpreter

Microsoft Releases Historic 6502 Basic

Microsoft BASIC for 6502 Microprocessor - Version 1.1 Historical Significance This assembly language source code represents one of the most historically significant pieces of software from the early personal computer era. It is the complete source code for Microsoft BASIC Version 1.1 for the 6502 microprocessor, originally developed and copyrighted by Microsoft in 1976-1978. Why This Document is Historically Important 1. Foundation of the Personal Computer Revolution This BASIC interpreter

Abstract Machine Models Also: what Rust got particularly right

Ever since 2010, I have studied the “meta” of software, by studying (and thinking about) the continued dialogue between programming language designers, computer designers, and programmers. The following constitutes a snapshot of my current thinking. Epistemological context During the period 2008-2012, I was requested to help design&build programming tools for a proposed new microprocessor architecture. The details of said architecture do not matter here; what is interesting is that folk in tha

ICE obtains access to Israeli-made spyware that hack phones and encrypted apps

US immigration agents will have access to one of the world’s most sophisticated hacking tools after a decision by the Trump administration to move ahead with a contract with Paragon Solutions, a company founded in Israel which makes spyware that can be used to hack into any mobile phone – including encrypted applications. The Department of Homeland Security first entered into a contract with Paragon, now owned by a US firm, in late 2024, under the Biden administration. But the $2m contract was

ICE reactivates contract with spyware maker Paragon

U.S. Immigration and Customs Enforcement (ICE) signed a contract last year with Israeli spyware maker Paragon worth $2 million. Shortly after, the Biden administration put the contract under review, issuing a “stop work order,” to determine whether the contract complied with an executive order on commercial spyware, which restricts U.S. government agencies from using spyware that could violate human rights or target Americans abroad. Almost a year later, when it looked like the contract would

Pennsylvania AG Office says ransomware attack behind recent outage

The Office of the Pennsylvania Attorney General announced that a ransomware attack is behind the ongoing two-week service outage. In an official statement, Attorney General David W. Sunday Jr. said that the office refused to pay the attackers. “The interruption was caused by an outsider encrypting files in an effort to force the office to make a payment to restore operations. No payment has been made,” explained AG Sunday. “An active investigation is ongoing with other agencies, which limits

Next.js is infuriating

Hey, it's finally happened. I've decided to write a blog post. And if you're reading this, I've also finished one. I have wanted to do this for a long time, but could never find the motivation to start. But you know what they say: anger is the best motivator. They do say that, right? Some context that's in the background We're going on a journey, you and I. But first, we need to set the scene. Imagine we're working for $COMPANY and one of our Next.js services did an oopsie. This being Next.js,

Next.js Is Infuriating

Hey, it's finally happened. I've decided to write a blog post. And if you're reading this, I've also finished one. I have wanted to do this for a long time, but could never find the motivation to start. But you know what they say: anger is the best motivator. They do say that, right? Some context that's in the background We're going on a journey, you and I. But first, we need to set the scene. Imagine we're working for $COMPANY and one of our Next.js services did an oopsie. This being Next.js,

BMW, I am so breaking up with you

I want to be clear from the outset. I’ve never been a car enthusiast. My driving history includes a hand-me-down Volvo with a hole in the floorboards and a series of aggressively practical vehicles, including a VW Golf and a Mazda SUV in which I hauled my family around for 12 years. Then I leased a BMW i4 electric car. What drew me to the i4? Unlike other electric vehicles, BMWs don’t look like something out of the Jetsons; I like that they’re understated cars that happen to be electric. I like

Topics: bmw car i4 like software

Apple isn’t done patching a discontinued iPhone thanks to EU radiation drama

Stop us if you’ve heard this one before. Apple is preparing a software update for an iPhone from 2020 to address a years-old health complaint only raised in one market. Specifically, Apple is once again updating iPhone 12 models to address a non-issue pushed by health authorities in France. This time the software update will apply to all iPhone 12 models in EU countries, and not just France. Here’s a recap from our coverage two years ago: French authorities determined that the iPhone 12 no lo

Leaked Analogue 3D press video finally gives us our first real look at the N64 clone

TL;DR The Analogue 3D hardware has finally been showcased, nearly a year after it was announced. A press video, uncovered by a Discord user before its official release, shows the finished hardware. After facing several delays, it’s still slated for a Q4 2025 release. When it was first announced last year, the Analogue 3D generated a lot of hype. However, despite reassurances from the company that development was on schedule, the company still hasn’t officially shown the finished hardware in a

Tesla Hit With Another Major Recall

Tesla is recalling 7,301 Model Y SUVs produced in 2025, following identification of a software defect in the driver’s side window’s automatic protection system. The recall, issued by Australia’s Department of Infrastructure, Transport, Regional Development, Communications, Sport and the Arts, warns that the window may close with excessive force if it fails to detect obstructions, posing a risk of injury. The latest recall is a perfect example of the dual-edge of automotive digitization, becaus

Mainframe upgrade done with wire cutters (2010)

Post by h***@bbs.cpcn.com IBM obviously "lost money" in giving out free software; I don't think they charged even for distribution tapes or documentation even in the 1970s after unbundling; if it was a legacy free item, you got the package for free. (And IIRC, some unbundled fee products were still quite cheap, esp as compared to today's software prices.) Anyway, the free software was IBM's 'loss leader' to build the utility value of its computers. IBM unbundled this partly in response to

We should have the ability to run any code we want on hardware we own

Sideloading has been a hot topic for the last decade. Most recently, Google has announced further restrictions on the practice in Android. Many hundreds of comment threads have discussed these changes over the years. One point in particular is always made: “I should be able to run whatever code I want on hardware I own”. I agree entirely with this point, but within the context of this discussion it’s moot. “I should be able to run whatever code I want on hardware I own” When Google restricts y

AI’s coding evolution hinges on collaboration and trust

Artificial intelligence (AI) has transformed the coding sphere, with AI coding tools completing source code, correcting syntax errors, creating inline documentation, and understanding and answering questions about a codebase. As the technology advances beyond automating programming tasks, the idea of full autonomy looms large. Is AI ready to be a real coder? A new paper says not yet—and maps out exactly why. Researchers from Cornell University, MIT CSAIL, Stanford University, and UC Berkeley hi

The best audio editing software of 2025: Expert tested and reviewed

You have the quiet area, the top-quality microphone, excellent speakers, and a reliable recording platform -- but without the right audio editing software or Digital Audio Workstation (DAW) to back you, your new audio production might fall short. Many of us now expect clear, quality sound when we listen not only to songs, but also when we listen to podcasts, social media videos, YouTube content, film and TV shows, and marketing materials. Listeners -- and potential subscribers -- are far more l

Hardware Flaw in Apple A16 Chip: Debug Logic Active on Production Devices

A16-FuseBypass: Debug Logic Enabled on Production Apple Silicon Overview This repository documents a critical hardware-level vulnerability in the Apple A16 Bionic chip used in iPhone 14 Pro Max and related devices. The flaw allows debug logic—meant strictly for development silicon—to be executed on production-fused devices ( dev-fused = 0 ) running stock, unmodified iOS with debug = 0x0 . No jailbreak. No provisioning profile. No tampering. Just flawed hardware trust enforcement. Summary of

WhatsApp fixes ‘zero-click’ bug used to hack Apple users with spyware

WhatsApp said on Friday that it fixed a security bug in its iOS and Mac apps that was being used to stealthily hack into the Apple devices of “specific targeted users.” The Meta-owned messaging app giant said in its security advisory that it fixed the vulnerability, known officially as CVE-2025-55177, which was used alongside a separate flaw found in iOS and Macs, which Apple fixed last week and tracks as CVE-2025-43300. Apple said at the time that the flaw was used in an “extremely sophistica

Why AI Isn't Ready to Be a Real Coder

Artificial intelligence (AI) has transformed the coding sphere, with AI coding tools completing source code, correcting syntax errors, creating inline documentation, and understanding and answering questions about a codebase. As the technology advances beyond automating programming tasks, the idea of full autonomy looms large. Is AI ready to be a real coder? A new paper says not yet—and maps out exactly why. Researchers from Cornell University, MIT CSAIL, Stanford University, and UC Berkeley hi

Security Bite: Why it’s mathematically impossible to stop malware

9to5Mac Security Bite is exclusively brought to you by Mosyle, the only Apple Unified Platform. Making Apple devices work-ready and enterprise-safe is all we do. Our unique integrated approach to management and security combines state-of-the-art Apple-specific security solutions for fully automated Hardening & Compliance, Next Generation EDR, AI-powered Zero Trust, and exclusive Privilege Management with the most powerful and modern Apple MDM on the market. The result is a totally automated Appl

The future of AI hardware isn’t one device — it’s an entire ecosystem

is a senior reporter focusing on wearables, health tech, and more with 13 years of experience. Before coming to The Verge, she worked for Gizmodo and PC Magazine. I dream of a gadget that can do it all. Instead, when I leave for the office, I pack one or two phones, a portable battery bank, a laptop, a Kindle, a new product I’m testing, and at least one pair of earbuds. In my backpack, there’s a pouch full of cords and adapters. On my body, I usually sport between two and four wearable devices.

Malware devs abuse Anthropic’s Claude AI to build ransomware

Anthropic's Claude Code large language model has been abused by threat actors who used it in data extortion campaigns and to develop ransomware packages. The company says that its tool has also been used in fraudulent North Korean IT worker schemes and to distribute lures for Contagious Interview campaigns, in Chinese APT campaigns, and by a Russian-speaking developer to create malware with advanced evasion capabilities. AI-created ransomware In another instance, tracked as ‘GTG-5004,’ a UK-b

MATLAB dev says ransomware gang stole data of 10,000 people

MathWorks, a leading developer of mathematical simulation and computing software, revealed that a ransomware gang stole the data of over 10,000 people after breaching its network in April. The company disclosed the attack on May 27, when it linked ongoing service outages to a ransomware incident that disrupted access to some internal systems and online applications for its staff and customers. Impacted services included multi-factor authentication (MFA), account SSO (Single Sign-On), the MathW

Storm-0501 hackers shift to ransomware attacks in the cloud

Microsoft warns that a threat actor tracked as Storm-0501 has evolved its operations, shifting away from encrypting devices with ransomware to focusing on cloud-based encryption, data theft, and extortion. The hackers now abuse native cloud features to exfiltrate data, wipe backups, and destroy storage accounts, thereby applying pressure and extorting victims without deploying traditional ransomware encryption tools. Storm-0501 is a threat actor who has been active since at least 2021, deployi

The Era of AI-Generated Ransomware Has Arrived

As cybercrime surges around the world, new research increasingly shows that ransomware is evolving as a result of widely available generative AI tools. In some cases, attackers are using AI to draft more intimidating and coercive ransom notes and conduct more effective extortion attacks. But cybercriminals’ use of generative AI is rapidly becoming more sophisticated. Researchers from the generative AI company Anthropic today revealed that attackers are leaning on generative AI more heavily—somet

Mosyle identifies new Mac malware that evades detection through fake PDF conversion tool

Mosyle, a leader in Apple device management and security, has exclusively revealed to 9to5Mac details on a new Mac malware strain, dubbed “JSCoreRunner”. The zero-day threat evaded all detections on VirusTotal at the time of discovery, spreading through a malicious PDF conversion site called fileripple[.]com to trick users into downloading what appears to be a harmless utility. Free tools that promise quick file conversions for HEIC and WebP files, PDFs, and Word docs have become prolific onlin

Malleable Software

In the AI era, the winners won’t be the tools you adapt to — they’ll be the tools that adapt to you. Let's take Linear. It is a beautiful, well-designed, simple but inflexible tool with little room for AI to add value. AI thrives in messy, open-ended spaces where it can design, assemble, and adapt — but in Linear, the major design choices have already been made. At best, AI might shave a few seconds off repetitive tasks or auto-fill a few fields, but it can’t reinvent the core process, because