Latest Tech News

Stay updated with the latest in technology, AI, cybersecurity, and more

Filtered by: access Clear Filter

Anthropic cuts off OpenAI’s access to its Claude models

In Brief Anthropic has revoked OpenAI’s access to its Claude family of AI models, according to a report in Wired. Sources told Wired that OpenAI was connecting Claude to internal tools that allowed the company to compare Claude’s performance to its own models in categories like coding, writing, and safety. TechCrunch has reached out to Anthropic and OpenAI for comment. In a statement to Wired, an Anthropic spokesperson said, “OpenAI’s own technical staff were also using our coding tools ahead

Anthropic revokes OpenAI's access to Claude

Anthropic revoked OpenAI’s API access to its models on Tuesday, multiple sources familiar with the matter tell WIRED. OpenAI was informed that its access was cut off due to violating the terms of service. “Claude Code has become the go-to choice for coders everywhere, and so it was no surprise to learn OpenAI's own technical staff were also using our coding tools ahead of the launch of GPT-5,” Anthropic spokesperson Christopher Nulty said in a statement to WIRED. “Unfortunately, this is a direc

Anthropic Revokes OpenAI's Access to Claude

Anthropic revoked OpenAI’s API access to its models on Tuesday, multiple sources familiar with the matter tell WIRED. OpenAI was informed that its access was cut off due to violating the terms of service. “Claude Code has become the go-to choice for coders everywhere, and so it was no surprise to learn OpenAI's own technical staff were also using our coding tools ahead of the launch of GPT-5,” Anthropic spokesperson Christopher Nulty said in a statement to WIRED. “Unfortunately, this is a direc

Anthropic Revokes OpenAI's Access to Claude

Anthropic revoked OpenAI’s API access to its models on Tuesday, multiple sources familiar with the matter tell WIRED. OpenAI was informed that its access was cut off due to violating the terms of service. “Claude Code has become the go-to choice for coders everywhere, and so it was no surprise to learn OpenAI's own technical staff were also using our coding tools ahead of the launch of GPT-5,” Anthropic spokesperson Christopher Nulty said in a statement to WIRED. “Unfortunately, this is a direc

OpenAI may be testing a cheaper paid plan for ChatGPT

OpenAI is reportedly working on a new plan called 'Go,' which would be cheaper than the existing $20 Plus subscription. Like every other AI chatbot, ChatGPT has two plans. One is Plus, which gives access to new models and a few features for $20, and the second is the Pro plan. The Pro plan costs $200 and provides nearly unlimited access to AI models. It also includes access to new features. But what if you have a limited use case for ChatGPT and don't need access to advanced features like Ag

Nintendo Raises Original Switch Prices, Blaming 'Market Conditions'

Nintendo says it's raising prices for the original Switch hardware lineup and select accessories. The company didn't provide details of how much the price will increase or give a reason why other than saying the increase was "based on market conditions," which is likely a reference to the tariffs imposed by President Donald Trump. The Switch OLED, Nintendo Switch, Switch Lite and certain accessories will see a price jump starting on Aug. 3, the company said in a post Friday. Nintendo says it wi

How to limit which photos you share with apps like Facebook and Instagram

9to5Mac is brought to you by Incogni: Protect your personal info from prying eyes. With Incogni, you can scrub your deeply sensitive information from data brokers across the web, including people search sites. Incogni limits your phone number, address, email, SSN, and more from circulating. Fight back against unwanted data brokers with a 30-day money back guarantee. With iOS 17, Apple introduced a new privacy setting that gives users much more granular control over which apps can access their p

Understanding the Complete Identity Management Ecosystem

Confused by the growing identity management landscape? This comprehensive guide breaks down every IAM category—from traditional workforce identity to emerging AI agents. Learn how CIAM, PAM, Zero Trust, and 15+ other solutions connect in the modern security ecosystem. 🔐 Identity management has grown from simple password systems into a complex web of specialized tools and technologies. Each piece serves a specific purpose, but understanding how they all fit together can be confusing. This guide

Show HN: The easiest accessibility (a11y) checker for VSCode

Be-a11y VSCode Extension A Visual Studio Code extension for running accessibility audits using be-a11y. This extension allows you to analyze your project or a remote website for accessibility issues directly from VSCode. Results are presented in a convenient way and can be saved for further review. Features Run accessibility audits on the current workspace (local project) or any URL View results directly in VSCode Save the latest accessibility report to a file All actions available in the

PSA: New ‘choicejacking’ attacks can steal your Android or iPhone’s data without your knowledge

Mishaal Rahman / Android Authority TL;DR Researchers have identified new methods to exploit backdoors into Android and iOS to steal data. “Choicejacking” is an evolution of the infamous juice jacking technique and also uses a rigged USB charger or cable to initiate data theft on your mobile devices. Choicejacking uses a combination of techniques to bypass existing juice jacking protection while faking user input to enable permissions illicitly. Juice jacking is a decade-old technique where h

The 8 Best Amazon Echo and Alexa Speakers (2025): We’ve Tested Them All

Other Alexa (or Alexa Compatible) Speakers Amazon Echo Pop for $40: The Echo Pop is a perfectly fine little speaker, and the cutest one in Amazon's lineup. Does it have great sound? No. It's fine enough for background tunes or if you're limited to a dorm room, but you'll get much better sound for a similar size from the Echo Dot (but you'll pay a little more, and you won't get as cute of colors!) Amazon Echo Show 5 (3rd Gen) for $90: This smart display is another just-fine option, but it's too

ACM Transitions to Full Open Access

ACM's Transition to Full Open Access: A New Era for Computing Research For more than seven decades, ACM has played a pivotal role in advancing computing research, fostering collaboration, and disseminating knowledge through its world-class Digital Library, influential publications, and premier conferences. In a significant step to broadening access to computing research, ACM is transitioning to a fully Open Access (OA) publishing model by the end of 2025. This bold move marks a pivotal moment

Russian airline Aeroflot grounds dozens of flights after cyberattack

Aeroflot, Russia's flag carrier, has suffered a cyberattack that resulted in the cancellation of more than 60 flights and severe delays on additional flights. Although official sources from Russia, like the General Prosecutor's Office, did not attribute the attack to specific threat groups or even origin, responsibility was taken by Ukrainian and Belarusian hacktivist collectives 'Silent Crow' and 'Cyberpartisans BY.' The latter are known for previous attacks on the Belarusian Railway, the cou

How attackers are still phishing "phishing-resistant" authentication

As awareness grows around many MFA methods being “phishable” (i.e. not phishing resistant), passwordless, FIDO2-based authentication methods (aka. passkeys) like YubiKeys, Okta FastPass, and Windows Hello are being increasingly advocated. This is a good thing. The most commonly used MFA factors (like SMS codes, push notifications, and app-based OTP) are routinely bypassed, with modern reverse-proxy “Attacker-in-the-Middle” phishing kits the most common method (and the standard choice for phishi

You won't regret buying these two Moft MagSafe accessories for your iPhone - here's why

The Moft Tripod accessory. Kayla Solino/ZDNET Everyone loves affordable upgrades. And MagSafe accessories are the easiest way to elevate your phone's design and function. At ZDNET, I test dozens of MagSafe accessories, from battery packs to wallets, phone cases, tripods, and more. And as a mobile accessory expert, there are genuinely a few that I reach for nearly every day that stand out from the mountains of MagSafe gear I've tried. The Moft MagSafe Tripod and the Moft MagSafe wallet are two

Software Development at 800 Words per Minute

Software Development at 800 Words Per Minute Jul 24, 2025, 12:19 AM (updated Jul 28, 2025, 10:18 PM ) Imagine reading code not by looking at the screen, but by listening to interface elements, variables, language constructs and operators read at 800 words per minute (WPM) - over 5 times faster than normal speech. It sounds like gibberish to most, but to me, it’s as natural as you reading this sentence. If you’ve ever wondered how someone codes without seeing the screen, or if you’re curious a

Wi-Fi 8 detailed, even if it's years away: More stable connections, lower latency

Serving tech enthusiasts for over 25 years.TechSpot means tech analysis and advice you can trust Forward-looking: The latest devices are only now starting to support Wi-Fi 7, and so Wi-Fi 8 remains several years away, but members of the group that defines Wi-Fi standards are already previewing what comes next. Wi-Fi 8 is designed to deliver more reliable connections, particularly in crowded and high-traffic public environments. A blog post from Qualcomm details several new technologies the com

Scattered Spider is running a VMware ESXi hacking spree

Scattered Spider hackers have been aggressively targeting virtualized environments by attacking VMware ESXi hypervisors at U.S. companies in the retail, airline, transportation, and insurance sectors. According to the Google Threat Intelligence Group (GITG), the attackers keep employing their usual tactics that do not include vulnerability exploits but rely on perfectly executed social engineering "to bypass even mature security programs." A Scattered Spider attack The researchers say that th

Solid protocol restores digital agency

How Solid Protocol Restores Digital Agency The current state of digital identity is a mess. Your personal information is scattered across hundreds of locations: social media companies, IoT companies, government agencies, websites you have accounts on, and data brokers you’ve never heard of. These entities collect, store, and trade your data, often without your knowledge or consent. It’s both redundant and inconsistent. You have hundreds, maybe thousands, of fragmented digital profiles that ofte

Do not download the app, use the website

The 2010s was the Wild West of the mobile world. "Mobile-first" was the buzzword, much like "AI-first" is today. Every company, from the biggest social media giants to your local pizza parlor, seemed to be pestering you to download their app. There was a genuine hype train, and everyone was on board. The apps, frankly, were always mediocre, and a far cry from the full functionality of their website counterparts. But the message was clear. If you weren't on mobile, you were falling behind. Fast

Microsoft investigates outage affecting Microsoft 365 admin center

Microsoft is investigating an ongoing outage blocking Microsoft 365 administrators with business or enterprise subscriptions from accessing the admin center. While the company has yet to disclose which regions are currently affected by this ongoing service degradation issue, it's currently tracking it on its official service health status page to provide impacted organizations with access to up-to-date information. "Microsoft is investigating a potential issue that may be preventing administra

Don’t get your hopes up for One UI 9 leaks as Samsung fixes this major loophole

Mishaal Rahman / Android Authority TL;DR Samsung has patched a loophole that enabled many recent One UI leaks. The exploit allowed users to access internal OTA builds via a custom tool and decrypt metadata. You almost certainly won’t be treated to as many One UI 9 leaks going forward. The Samsung fans among you enjoy delving into One UI leaks, and we enjoy bringing them to you when they surface. The bad news for all of us is that it looks like the party might be over. According to a report

A Premium Luggage Service’s Web Bugs Exposed the Travel Plans of Every User—Including Diplomats

An airline leaving all of its passengers’ travel records vulnerable to hackers would make an attractive target for espionage. Less obvious, but perhaps even more useful for those spies, would be access to a premium travel service that spans 10 different airlines, left its own detailed flight information accessible to data thieves, and seems to be favored by international diplomats. That's what one team of cybersecurity researchers found in the form of Airportr, a UK-based luggage service that p

Mitel warns of critical MiVoice MX-ONE authentication bypass flaw

Mitel Networks has released security updates to patch a critical-severity authentication bypass vulnerability impacting its MiVoice MX-ONE enterprise communications platform. MX-ONE is the company's SIP-based communications system, which can scale to support hundreds of thousands of users. The critical security flaw is due to an improper access control weakness discovered in the MiVoice MX-ONE Provisioning Manager component and has yet to be assigned a CVE ID. Unauthenticated attackers can exp

Shattering the rotation illusion: The attacker view and AWSKeyLockdown (2024)

PDF Report Shattering the Rotation Illusion: How Quickly Leaked AWS Keys are Exploited Download Now -> Through the Attacker’s Eyes: A New Era of NHI Security This final installment in our blog series brings together everything we’ve uncovered about leaked AWS Access Keys—how attackers exploit them, why traditional security measures fall short, and what organizations can do to protect themselves. Over the series, we explored real-world scenarios across various platforms: GitHub and GitLab, Pac

Shattering the Rotation Illusion: The Attacker View & AWSKeyLockdown

PDF Report Shattering the Rotation Illusion: How Quickly Leaked AWS Keys are Exploited Download Now -> Through the Attacker’s Eyes: A New Era of NHI Security This final installment in our blog series brings together everything we’ve uncovered about leaked AWS Access Keys—how attackers exploit them, why traditional security measures fall short, and what organizations can do to protect themselves. Over the series, we explored real-world scenarios across various platforms: GitHub and GitLab, Pac

4 things Proton's privacy-first AI chatbot Lumo can do - and how to try it

Elyse Betters Picaro / ZDNET Proton, the company responsible for Proton Mail, Proton VPN, and more services, is planning to launch a new AI chatbot called Lumo that aims to preserve your privacy. This new chatbot can do things like summarize documents, create code, and just about anything the other chatbots can do. 1. Stores data locally The difference between Lumo and other chatbots is that Lumo stores all data locally, so you don't have to worry that the company has access to your data. Pro

CISA and FBI warn of escalating Interlock ransomware attacks

CISA and the FBI warned on Tuesday of increased Interlock ransomware activity targeting businesses and critical infrastructure organizations in double extortion attacks. Today's advisory was jointly authored with the Department of Health and Human Services (HHS) and the Multi-State Information Sharing and Analysis Center (MS-ISAC) and it provides network defenders with indicators of compromise (IOCs) collected during investigations of incidents as recent as June 2025, along with mitigation meas