Latest Tech News

Stay updated with the latest in technology, AI, cybersecurity, and more

Filtered by: data Clear Filter

Everything tech giants will hate about the EU’s new AI rules

The European Union is moving to force AI companies to be more transparent than ever, publishing a code of practice Thursday that will help tech giants prepare to comply with the EU's landmark AI Act. These rules—which have not yet been finalized and focus on copyright protections, transparency, and public safety—will initially be voluntary when they take effect for the biggest makers of "general purpose AI" on August 2. But the EU will begin enforcing the AI Act in August 2026, and the Commiss

LGND wants to make ChatGPT for the Earth

The Earth is awash in data about itself. Every day, satellites capture around 100 terabytes of imagery. But making sense of it isn’t always easy. Seemingly simple questions can be fiendishly complex to answer. Take this question that is of vital economic importance to California: How many fire breaks does the state have that might stop a wildfire in its tracks, and how have they changed since the last fire season? “Originally, you’d have a person look at pictures. And that only scales so far,”

Analyzing Database Trends Through 1.8M Hacker News Headlines

How the analysis was done I used camelAI with a ClickHouse database of every HN story to do all analysis. You can use it for free with no login here to explore the data interactively yourself. 18 years • 1.8 million headlines • 13 database engines Hacker News is a real-time barometer of developer excitement. I mined every story title from February 2007 to June 2025 and asked three questions: How has headline volume for each database changed over time? Which engines are accelerating the fast

FBI's CJIS demystified: Best practices for passwords, MFA & access control

Imagine your organization has just won a contract to handle sensitive law-enforcement data – you might be a cloud provider, a software vendor, or an analytics firm. It won’t be long before CJIS is top of mind. You know the FBI’s Criminal Justice Information Services Security Policy governs how criminal histories, fingerprints, and investigation files must be protected, but beyond that, it all feels a bit opaque. Whether you’re a veteran security pro or new to the world of criminal-justice data

This magnetic USB-C accessory is the best $12 I've ever spent on Amazon

ZDNET's key takeaways The magnetic USB-C connector now supports a 180-degree swivel, and it's only $12 at Amazon. It can pump out as much as 240W of power. I just wish it was suitable for data transferring or powering monitors. $12.99 at Amazon A hill I'm always willing to fight on -- and maybe even die on -- is that the magnetic breakaway USB-C connector is one of the best USB accessories out there. Sure, it's not as flashy as a hardware-encrypted storage device or as geeky as a USB power me

EU regulators are once again investigating TikTok over data transfers to China

TikTok is in more regulatory hot water. Only a couple of months after it slapped TikTok with a hefty fine over data transfers to China, Ireland’s Data Protection Commission (DPC) is opening a fresh investigation into the platform. During the previous probe, TikTok claimed that European Economic Area (EEA) user data was stored on servers outside China. It said that TikTok staff in China accessed such data remotely. The DPC concluded the investigation on April 30 and fined TikTok 530 million euro

German court rules Meta tracking technology violates European privacy laws

A German court has ruled that Meta must pay €5,000 ($5,900) to a German Facebook user who sued the platform for embedding tracking technology in third-party websites — a ruling that could open the door to large fines down the road over data privacy violations relating to pixels and similar tools. The Regional Court of Leipzig in Germany ruled Friday that Meta tracking pixels and software development kits embedded in countless websites and apps collect users’ data without their consent and viola

Multi-Region Row Level Security in CockroachDB

Controlling who can access what data is more important than ever as organizations scale and modernize their data infrastructure. Enterprises are modernizing their critical databases, and they need fine-grained, built-in access controls that go beyond table-level permissions. That’s why, with the 25.2 release of CockroachDB , we’re introducing Row-Level Security — a powerful feature that allows you to define and enforce access policies at the row level, directly within the database. This form o

I tested a subscription-free smart ring that rivals Oura - and it's $50 off for Prime Day

ZDNET's key takeaways The Ultrahuman Ring Air is the brand's first foray into the smart ring space, and it's available for $349, no subscription required The ring is great for hardcore fitness enthusiasts and recreational exercisers looking to use their health data to optimize their wellness routines The app's user interface could be improved for easier access to daily logging functions. $349 at Amazon For Amazon Prime Day, the retailer is offering the Ultrahuman Ring Air at a $50 discount, b

Qantas confirms data breach impacts 5.7 million customers

Australian airline Qantas has confirmed that 5.7 million people have been impacted by a recent data breach, in which threat actors stole customers' data. On July 1st, Qantas disclosed that it had detected a cyberattack the previous day on a third-party platform used by a Qantas airline contact centre. While the company did not share any further details, BleepingComputer learned that the attack shared similarities with other attacks on the aviation industry linked to threat actors classified as

A New Kind of AI Model Lets Data Owners Take Control

A new kind of large language model, developed by researchers at the Allen Institute for AI (Ai2), makes it possible to control how training data is used even after a model has been built. The new model, called FlexOlmo, could challenge the current industry paradigm of big artificial intelligence companies slurping up data from the web, books, and other sources—often with little regard for ownership—and then owning the resulting models entirely. Once data is baked into an AI model today, extract

Bitcoin Depot breach exposes data of nearly 27,000 crypto users

Bitcoin Depot, an operator of Bitcoin ATMs, is notifying customers of a data breach incident that has exposed their sensitive information. In the letter sent to affected individuals, the company informs that it first detected suspicious activity on its network last year on June 23. Although the internal investigation was completed on July 18, 2024, a parallel investigation by federal agencies dictated that public disclosure of the incident should be withheld until it was completed. “On July 1

Samsung just gave its Galaxy foldable phones a big security upgrade - for free

Kerry Wan/ZDNET Alongside the release of its latest foldables, the Galaxy Z Flip 7 and Galaxy Z Fold 7, tech giant Samsung also announced a slew of new AI features for its devices at Samsung Unpacked. While the new features make it easy to access AI assistance, they also highlight the need for enhanced security -- and Samsung, with its latest Knox update, has stepped up to the plate. Also: The best VPN services (and how to choose the right one for you) Tech companies tend to prefer on-device

Looking for an External Hard Drive? This Seagate 24TB Is Just $0.01/GB for Prime Day

Among the vicious competition in the market for external hard drives, four of the largest players – Seagate, WD, SanDisk, and Samsung – are in a constant fight for your attention. Seagate just came today with an incredible 24TB external hard drive on sale at a new record low price: Selling for just $259 (down from $329), Seagate’s Expansion 24TB HDD set a new record low price per gigabyte of about $0.01, which lower than all other drives (including ones with smaller capacities). See at Amazon

Qantas Contacted by Hackers Responsible for Data Breach Affecting Millions of Customers

Qantas disclosed a cybersecurity incident on July 2 potentially affecting 6 million customers. Ryan Fletcher/Getty Images Qantas has been contacted by a cyber criminal claiming responsibility for the data breach that affected 6 million customers. A company spokesperson confirmed Qantas is working to validate this, adding that since it's a criminal matter, the company "won't be commenting any further on the detail of the contact." There's also no evidence that any of the stolen information has

iMerit believes better-quality data, not more data, is the future of AI

AI data platform iMerit believes the next step toward integrating AI tools at the enterprise level is not more data, but better data. And better data doesn’t come from hordes of gig workers, but from experts across mathematics, medicine, healthcare, finance, autonomy, and other cognitive fields, the company says. “What’s become exceedingly important is the ability to attract and retain the best cognitive experts, because we have to take these large models and make them very customized towards s

New ServiceNow flaw lets attackers enumerate restricted data

A new vulnerability in ServiceNow, dubbed Count(er) Strike, allows low-privileged users to extract sensitive data from tables to which they should not have access. ServiceNow is a cloud-based platform that enables organizations to manage digital workflows for their enterprise operations. It is widely adopted across various industries, including public sector organizations, healthcare, financial institutions, and large enterprises. The flaw was discovered by Varonis Threat Labs in February 2025

The biggest AI feature announced at Samsung Unpacked was also the most subtle

Sabrina Ortiz/ZDNET Alongside the release of its latest foldables, the Galaxy Z Flip 7 and Galaxy Z Fold 7, tech giant Samsung also announced a slew of new AI features for its devices at Samsung Unpacked. While the new features make it easy to access AI assistance, they also highlight the need for enhanced security -- and Samsung, with its latest Knox update, has stepped up to the plate. Also: The best VPN services (and how to choose the right one for you) Tech companies tend to prefer on-dev

Using MPC for Anonymous and Private DNA Analysis

Earlier this year, Monadic DNA kicked off an experiment to demonstrate that people can access and analyze their genetic data with anonymity and privacy. Monadic DNA collected saliva samples from thirty encrypted genomics pioneers at an event in Denver. These participants later used a Web app to claim their genotyping results using a unique kit ID and a self-selected PIN. The app guided users through uploading their data to encrypted storage powered by Nillion’s multi-party compute (MPC) techno

The Capacity, Performance, and Reliability of MicroSD Cards

Or: What are the best microSD cards you can get for under $15 in 2024 2025? Before you get in: Support me on Patreon! If you just want to see my (current) top picks, click here. If you want to see details on the cards I’m testing, click here. If you want to see the table with my raw data, click here. If you want to see more ways you can help, click here. If you want to read in more detail about the background behind this project and my methodology, read on! Table of Contents Introductio

SUSE launches new European digital sovereignty service to meet surging demand

Thomas Fuller/SOPA Images/LightRocket via Getty Images Wary of the US government and tech companies, the European Union (EU) has seen a surge in support for open source and Linux. In the last few months, local EU governments, including the city of Lyon in France, the German state of Schleswig-Holstein, and Denmark, have begun their move to Linux and open-source software from Microsoft Windows and Office. Now, Luxembourg-based European open-source powerhouse SUSE is offering extensive support to

Choosing a Database Schema for Polymorphic Data (2024)

Designing a schema for your relational database is a daunting task that has long term implications for the database's performance, maintainability, and correctness. And it often requires making decisions before having a clear picture of the exact shape and distribution of your data, or what the common access patterns will look like. It's not a permanent decision: tables can be altered and databases migrated. But these migrations can be slow and expensive. To top it all off, some data is less am

Libpostal: C library for parsing/normalizing street addresses around the world

libpostal: international street address NLP libpostal is a C library for parsing/normalizing street addresses around the world using statistical NLP and open data. The goal of this project is to understand location-based strings in every language, everywhere. For a more comprehensive overview of the research behind libpostal, be sure to check out the (lengthy) introductory blog posts: 🇧🇷 🇫🇮 🇳🇬 🇯🇵 🇽🇰 🇧🇩 🇵🇱 🇻🇳 🇧🇪 🇲🇦 🇺🇦 🇯🇲 🇷🇺 🇮🇳 🇱🇻 🇧🇴 🇩🇪 🇸🇳 🇦🇲 🇰🇷 🇳🇴 🇲🇽 🇨🇿 🇹🇷 🇪🇸 🇸🇸 🇪🇪 🇧🇭 🇳🇱 🇨🇳 🇵🇹 🇵🇷 🇬🇧 🇵🇸 Address

Samsung announces major security enhancements coming to One UI 8

Samsung has announced multiple data security and privacy enhancements for its upcoming Galaxy smartphones running One UI 8, its custom user interface on top of Android. Key highlights include the introduction of a system-level architecture named Knox Enhanced Encrypted Protection (KEEP), upgrades to Knox Matrix, and the addition of quantum resistance to WiFi connectivity. Keeping AI data secure With AI tools taking an increasing role in day-to-day smartphone use, protecting user inputs has be

Supabase MCP can leak your entire SQL database

Model Context Protocol (MCP) has emerged as a standard way for LLMs to interact with external tools. While this unlocks new capabilities, it also introduces new risk surfaces. In this post, we show how an attacker can exploit Supabase’s MCP integration to leak a developer’s private SQL tables. The Problem LLMs are often used to process data according to pre-defined instructions. The system prompt, user instructions, and the data context is provided to the LLM as text. [ SYSTEM PROMPT ] You ar

The Tradeoffs of SSMs and Transformers

This blog post was adapted from a talk I’ve given a handful of times over the last year. It was meant to be a high-level talk accessible to a fairly broad audience, but hopefully has some interesting insights, opinions, and intuitions around sequence models for the dedicated researchers too. State Space Models Just so we’re on the same page, I’ll start by defining what I mean by a state space model. (This section isn’t strictly necessary to get to the main part of this post though; feel free t

I tested the 4 most popular health trackers for a year - and they're on sale for Prime Day

The Oura Ring is, in my opinion, the sleep and health tracker to rule them all. Not only does it track your sleep, stress, activity, and more, it also creates helpful data illustrations that encourages healthy habits, whether that's a consistent bedtime routine, daily activity, or reduced alcohol consumption. Many users, myself included, have reported changing their drinking habits after seeing their heart rate's response to a few beers late at night on Oura's graphs. Earning high sleep scores

Supabase MCP leaks your entire SQL Database, a lethal trifecta attack

Supabase MCP can leak your entire SQL database (via) Here's yet another example of a lethal trifecta attack, where an LLM system combines access to private data, exposure to potentially malicious instructions and a mechanism to communicate data back out to an attacker. In this case, General Analysis identify all three components in a single MCP - the Supabase MCP. They imagine a scenario where a developer asks Cursor, running the Supabase MCP, to "use cursor’s agent to list the latest support

I found a subscription-free smart ring that rivals Oura - and it's $50 off for Prime Day

ZDNET's key takeaways The Ultrahuman Ring Air is the brand's first foray into the smart ring space, and it's available for $349, no subscription required The ring is great for hardcore fitness enthusiasts and recreational exercisers looking to use their health data to optimize their wellness routines The app's user interface could be improved for easier access to daily logging functions. $349 at Amazon For Amazon Prime Day, the retailer is offering the Ultrahuman Ring Air at a $50 discount, b

I Tried Signal, Telegram and WhatsApp, and This Is the One I'd Recommend

Key points: Most widely used messaging app Uses the same encryption protocol as Signal Collects heaps of your data Free, but owned and operated by Meta WhatsApp is the most popular private messaging app on this list, with about 2 billion monthly users, according to Exploding Topics. Because it's so popular, there's a higher chance that other people you might be chatting with have WhatsApp, and therefore your chats can be encrypted. And if the person you're chatting with doesn't have WhatsAp