Latest Tech News

Stay updated with the latest in technology, AI, cybersecurity, and more

Filtered by: ty Clear Filter

Google Maps is rolling out a new look for the listing page (APK teardown)

Rita El Khoury / Android Authority TL;DR Google Maps is getting a few UI tweaks for the listing page. The “Popular times” section for a location has moved above the reviews section. The options for suggesting an edit, measuring distance, adding a missing place, and adding your business now have proper buttons. When you search for a place in Google Maps, say the Eiffel Tower, you’ll see a listing page right under the map. The overview tab on that page contains a variety of information you may

Google is playing with an energetic new Gemini animation (APK teardown)

AssembleDebug / Android Authority TL;DR As part of its big Material 3 Expressive overhaul, Google’s been rethinking its approach to the Gemini overlay. Instead of just gently sliding onto screen, Google’s been working to give Gemini a little bouncy momentum. The latest version of this animation we’ve uncovered is easily the most dynamic yet. Change is coming to Google’s Android software, and that change’s name is Material 3 Expressive. The company’s latest design language is being implemente

Google is testing a cooler, darker design for Gemini Live’s overlay (APK teardown)

Mishaal Rahman / Android Authority TL;DR Google is testing a visual refresh for Gemini Live’s compact overlay in the latest app beta. The redesigned UI includes rounded corners, smaller icons, and a dark background. The corner widget has also been updated to be circular with a more vibrant waveform. Google isn’t done refining the Gemini Live experience. Following last month’s reveal of a more compact overlay interface, we’ve now uncovered some potential visual updates to that same UI. In our

This transforming, dual-screened Android console is the most interesting handheld I’ve ever tested

Nick Fernandez / Android Authority It isn’t often that something entirely new crops up in the gaming space. Nintendo is the only player still innovating when it comes to handhelds, but even then the evolution from the Wii U in 2012 to the Nintendo Switch 2 released just a few months ago feels far more iterative than say, the leap from the Game Boy to the Nintendo DS. Then there’s the ONEXSUGAR SUGAR 1. With two screens, folding controllers, and more power than nearly any other Android gaming h

Best Home Security Systems in 2025: Protect Your Home and Your Family

SimpliSafe home security systems can be easily tailored to your needs. Just add or subtract hardware and equipment as you please. CNET When choosing a home security system for your home, you may be tempted to start by deciding between a DIY setup or one that is professionally installed and monitored. When you consider the equipment, installation, monitoring options and other features you want, you'll probably reach a DIY-versus-pro system decision along the way. Here are some more parameters to

Anduril alums raise $24M Series A to bring military logistics out of the Excel spreadsheet era

Silicon Valley is doubling down on defense as geopolitical tensions rise and appetite for modernizing warfare grows. And while many of the startups garnering large valuations are focused on hardware and weaponry — think Anduril, Shield AI, and Skydio — Rune Technologies wants to tackle AI-enabled software for military logistics. “The U.S. military runs on Excel spreadsheets and white boards and manual processes right now to execute logistics operations,” co-founder David Tuttle told TechCrunch.

This ‘violently racist’ hacker claims to be the source of The New York Times’ Mamdani scoop

is a reporter who writes about tech, money, and human behavior. She joined The Verge in 2014 as science editor. Previously, she was a reporter at Bloomberg. The ultimate source for The New York Times’ story about Zohran Mamdani’s college application is an open secret. It’s an anime-loving neo-Nazi whose hobbies include furry drawings, posting fan art of a video game character, and hacking universities. On X, the alleged hacker is followed by New York Times freelancer Benjamin Ryan, who was the

Microsoft Sharepoint server vulnerability puts an estimated 10,000 organizations at risk

A major zero-day security vulnerability in Microsoft's widely used SharePoint server software has been exploited by hackers, causing chaos within businesses and government agencies, multiple outlets have reported. Microsoft announced that it had released a new security patch "to mitigate active attacks targeting on-premises [and not online] servers," but the breach has already effected universities, energy companies, federal and state agencies and telecommunications firms. The SharePoint flaw i

10,000+ companies at risk from Microsoft Sharepoint security flaw

More than 10,000 organizations around the world are at risk from hackers after a serious security flaw was discovered in Microsoft’s popular Sharepoint platform, used to store and share confidential documents. The majority of companies at risk are said to be in the US … Microsoft said that there were “active attacks targeting on-premises servers.” US federal and state agencies are among the organizations said to have been affected. Security researchers cited by Bloomberg said that the vulnerab

The Demise of China’s Hottest Online Shopping Craze

During the height of the pandemic, a unique kind of online shopping became one of the hottest trends in China’s tech industry. Called “community group buying,” it allowed consumers to save money on everything from apples to iPhones by placing bulk orders together with their friends and family. The model, which was kind of like Groupon meets Instacart, proved especially popular for groceries. But now, China's community group-buying platforms are vanishing one by one. Late last month, Meituan, th

These are our favorite cyber books on hacking, espionage, crypto, surveillance, and more

In the last 30 years or so, cybersecurity has gone from being a niche specialty within the larger field of computer science, to an industry estimated to be worth more than $170 billion made of a globe-spanning community of hackers. In turn, the industry’s growth, and high-profile hacks such as the 2015 Sony breach, the 2016 U.S. election hack and leak operations, the Colonial Pipeline ransomware attack, and a seemingly endless list of Chinese government hacks, have made cybersecurity and hacking

Best Internet Providers in Kansas City, Missouri

What's the best internet provider in Kansas City? Kansas City is known for its many nicknames, including the City of Fountains and Paris of the Plains. But it's also known for its fast, reliable internet. It easily makes the city a standout for anyone looking to move into the area -- particularly if you're thinking of working remotely or have a large family that relies on great internet for entertainment purposes. With that in mind, after thoroughly testing what's available, Google Fiber is CNE

HPE warns of hardcoded passwords in Aruba access points

Hewlett-Packard Enterprise (HPE) is warning of hardcoded credentials in Aruba Instant On Access Points that allow attackers to bypass normal device authentication and access the web interface. Aruba Instant On Access Points are compact, plug-and-play wireless (Wi-Fi) devices, designed primarily for small to medium-sized businesses, offering enterprise-grade features (guest networks, traffic segmentation) with cloud/mobile app management. The security issue, tracked as CVE-2025-37103 and rated

Microsoft SharePoint zero-day exploited in RCE attacks, no patch available

A critical zero-day vulnerability in Microsoft SharePoint, tracked as CVE-2025-53770, has been actively exploited since at least July 18th, with no patch available and at least 85 servers already compromised worldwide. In May, Viettel Cyber Security researchers chained two Microsoft SharePoint flaws, CVE-2025-49706 and CVE-2025-49704, in a "ToolShell" attack demonstrated at Pwn2Own Berlin to achieve remote code execution. While Microsoft patched both ToolShell flaws as part of the July Patch T

The bewildering phenomenon of declining quality

It’s as if the smell of burnt plastic from a dollar store has permeated the world. Things are worse: chipboard furniture, T-shirts unrecognizable after a second wash, packaged foods with more preservatives than ingredients. Airplane seats turned into backrests. Automatic restroom lights that turn off at a whim. But also newspaper articles shamelessly written with ChatGPT and its algorithmic prose. Nothing is made to be loved. Only to be bought. In a study titled The Concept and Measurement of P

AI Data Centers Accused of Creating Major Problems for Local Water Systems

After Meta started building an enormous data center less than 400 yards away from their house, a couple living in Newton County, Georgia, says their water started to dry up. That began in 2018; years later, two of their bathroom taps still don't work. What water remains has turned into a gritty sludge, littered with sediments. So far, Beverly Morris and her husband Jeff have spent $5,000 on their water problems, they told the New York Times in a new interview, and can't afford to replace their

Threat actors downgrade FIDO2 MFA auth in PoisonSeed phishing attack

A PoisonSeed phishing campaign is bypassing FIDO2 security key protections by abusing the cross-device sign-in feature in WebAuthn to trick users into approving login authentication requests from fake company portals. The PoisonSeed threat actors are known to employ large-volume phishing attacks for financial fraud. In the past, distributing emails containing crypto seed phrases used to drain cryptocurrency wallets. In the recent phishing attack observed by Expel, the PoisonSeed threat actors

MCP Security Vulnerabilities and Attack Vectors

Elevenlabs AudioNative Player Been digging into Model Context Protocol implementations lately and found some stuff that's keeping me up at night. Not because it's earth-shattering, but because it's the kind of boring security debt that bites you when you least expect it. This is Part 1 of a two-part series. Read Part 2: Actually Fixing This Mess → MCP is Anthropic's attempt at standardizing how AI models talk to external tools1. Instead of every AI app rolling their own integration layer, you

A CarFax for Used PCs: Hewlett Packard wants to give old laptops new life

The United Nations’ Global E-waste Monitor estimates that the world generates over 60 million tonnes of e-waste annually. Furthermore, this number is rising five times as fast as e-waste recycling. Much of this waste comes from prematurely discarded electronic devices. Many enterprises follow a standard three-year replacement cycle, assuming older computers are inefficient. However, many of these devices are still functional and could perform well with minor upgrades or maintenance. The issue i

Brain Scans Reveal Why Waking Up Is Sometimes Such a Difficult Experience

Want to wake up feeling great? The secret might not be so simple as a multi-step nighttime routine, early bedtime, or a no-device rule. A new study suggests that how we fall asleep and how we wake up the next day may not be so similar as we once thought. Neuroscientists tracked 20 people’s brain activity as they woke up from sleep—sometimes naturally, sometimes by setting off an alarm—recording more than 1,000 awakenings in total. They found a pattern of neural activity signaled waking, but tha

Best TVs I've Tested (July 2025)

The Sony Bravia 8 II is a new flagship OLED David Katzmaier/CNET With all of the TVs available today, and all of the technical terms and jargon associated with television technology, it can be tough to figure out what's important. Here's a quick guide to help cut through the confusion. Picture quality: Broadly speaking, the type of display technology helps dictate how good a TV's picture quality is, but OLED is typically the best display technology, and this is followed by LCD (including QLED,

New CrushFTP zero-day exploited in attacks to hijack servers

CrushFTP is warning that threat actors are actively exploiting a zero-day vulnerability tracked as CVE-2025-54309, which allows attackers to gain administrative access via the web interface on vulnerable servers. CrushFTP is an enterprise file transfer server used by organizations to securely share and manage files over FTP, SFTP, HTTP/S, and other protocols. According to CrushFTP, threat actors were first detected exploiting the vulnerability on July 18th at 9AM CST, though it may have begun

How OpenAI’s red team made ChatGPT agent into an AI fortress

Want smarter insights in your inbox? Sign up for our weekly newsletters to get only what matters to enterprise AI, data, and security leaders. Subscribe Now In case you missed it, OpenAI yesterday debuted a powerful new feature for ChatGPT and with it, a host of new security risks and ramifications. Called the “ChatGPT agent,” this new feature is an optional mode that ChatGPT paying subscribers can engage by clicking “Tools” in the prompt entry box and selecting “agent mode,” at which point, t

Shutting Down Clear Linux OS

After years of innovation and community collaboration, we’re ending support for Clear Linux OS. Effective immediately, Intel will no longer provide security patches, updates, or maintenance for Clear Linux OS, and the Clear Linux OS GitHub repository will be archived in read-only mode. So, if you’re currently using Clear Linux OS, we strongly recommend planning your migration to another actively maintained Linux distribution as soon as possible to ensure ongoing security and stability. Rest ass

CrushFTP zero-day exploited in attacks to gain admin access on servers

CrushFTP is warning that threat actors are actively exploiting a zero-day vulnerability tracked as CVE-2025-54309, which allows attackers to gain administrative access via the web interface on vulnerable servers. CrushFTP is an enterprise file transfer server used by organizations to securely share and manage files over FTP, SFTP, HTTP/S, and other protocols. According to CrushFTP, threat actors were first detected exploiting the vulnerability on July 18th at 9AM CST, though it may have begun

Phishers have found a way to downgrade—not bypass—FIDO MFA

Researchers recently reported encountering a phishing attack in the wild that bypasses a multifactor authentication scheme based on FIDO (Fast Identity Online), the industry-wide standard being adopted by thousands of sites and enterprises. If true, the attack, reported in a blog post Thursday by security firm Expel, would be huge news, since FIDO is widely regarded as being immune to credential phishing attacks. After analyzing the Expel write-up, I’m confident that the attack doesn’t bypass F

GrapheneOS makers take a knife to this ‘Google-free’ phone coming to the US (Updated)

Update, July 18, 2025 (04:40 PM ET): We have just heard back from Fairphone in response to our inquiry. In a statement, the company explains: Fairphone and Murena have a strong, proud partnership that offers many users around the world a secure, sustainable, and modular smartphone alternative – with a clear focus on longevity and lasting value. We’re committed to delivering operating systems that meet market-standard security expectations. While we respect that there are different approaches to

Leaked iPhone 17 Air battery capacity reveals new model’s biggest weakness

Source: AppleTrack This fall, an ultra-thin iPhone 17 Air will join Apple’s product lineup. But unsurprisingly, that radically thin design will likely come with some battery compromises. Here’s what the latest leak says about iPhone 17 Air battery capacity. iPhone 17 Air battery ‘does not exceed 3000mAh,’ per leaker Back in May, leaker yeux1122 claimed that the iPhone 17 Air’s battery capacity would be lower than some might have expected. Per the account, Apple’s new iPhone 17 Air is getting

This Dark and Atmospheric '90s Flick Is a Sci-Fi Classic, and It's Streaming Free on Tubi

The '90s were the heyday of techno-noir movies, flicks that combine the cynical atmosphere and jaded perspectives of film noir with the dystopian settings and altered reality of science fiction. Though movies like The Matrix may have exploded the popularity of the genre, there were also films that didn't get the attention they deserved on release. One of my overlooked favorites is Dark City, a mind-bending techno-noir thriller that explores the idea of identity against the backdrop of a city sw