Latest Tech News

Stay updated with the latest in technology, AI, cybersecurity, and more

Filtered by: sec Clear Filter

Everything You Need to Know About the Sonic the Hedgehog Magic: The Gathering Drop

Magic: The Gathering hit a goldmine earlier this month when it released its Final Fantasy set based on one of the most popular video game franchises of all time. Final Fantasy was reportedly the best-selling Magic set before it even released, thanks to extensive preorders. Now Wizards of the Coast is hoping to repeat that success with Secret Lair drops themed around video game icon Sonic the Hedgehog, launching Monday, July 14. Wizards of the Coast/Sega Wizards of the Coast/Sega Wizards of th

How vulnerable is critical infrastructure to cyberattack in the US?

is a senior science reporter covering energy and the environment with more than a decade of experience. She is also the host of Hell or High Water: When Disaster Hits Home , a podcast from Vox Media and Audible Originals. Our water, health, and energy systems are increasingly vulnerable to cyberattack. Now, when tensions escalate — like when the US bombed nuclear facilities in Iran this month — the safety of these systems becomes of paramount concern. If conflict erupts, we can expect it to be

How runtime attacks turn profitable AI into budget black holes

This article is part of VentureBeat’s special issue, “The Real Cost of AI: Performance, Efficiency and ROI at Scale.” Read more from this special issue. AI’s promise is undeniable, but so are its blindsiding security costs at the inference layer. New attacks targeting AI’s operational side are quietly inflating budgets, jeopardizing regulatory compliance and eroding customer trust, all of which threaten the return on investment (ROI) and total cost of ownership of enterprise AI deployments. AI

NordVPN review 2025: Innovative features, a few missteps

Engadget has been testing and reviewing consumer tech since 2004. Our stories may include affiliate links; if you buy something through a link, we may earn a commission. Read more about how we evaluate products . NordVPN is as fast as it claims, but its apps sometimes get in their own way. When we say that NordVPN is a good VPN that's not quite great, it's important to put that in perspective. Building a good VPN is hard, as evidenced by all the shovelware VPNs flooding the market. NordVPN may

Microsoft changes Windows in attempt to prevent next CrowdStrike-style catastrophe

In the summer of 2024, corporate anti-malware provider CrowdStrike pushed a broken update to millions of PCs and servers running some version of Microsoft's Windows software, taking down systems that both companies and consumers relied on for air travel, payments, emergency services, and their morning coffee. It was a huge outage, and it caused days and weeks of pain as the world's permanently beleaguered IT workers brought systems back online, in some cases touching each affected PC individuall

The Windows kernel is about to receive a security-focused redesign after CrowdStrike crash

Why it matters: The kernel space is the core component of a computer operating system, where critical hardware management and device driver code reside in memory. If a kernel-level driver malfunctions, the entire OS can behave erratically – or simply crash and burn with a BSOD. Microsoft has stated that it is working on a significant change to the Windows architecture to help prevent another large-scale incident like the one involving CrowdStrike a year ago. Microsoft is developing a new securi

NordVPN Review 2025: Innovative features, a few missteps

Engadget has been testing and reviewing consumer tech since 2004. Our stories may include affiliate links; if you buy something through a link, we may earn a commission. Read more about how we evaluate products . NordVPN is as fast as it claims, but its apps sometimes get in their own way. When we say that NordVPN is a good VPN that's not quite great, it's important to put that in perspective. Building a good VPN is hard, as evidenced by all the shovelware VPNs flooding the market. NordVPN may

Microsoft is trying to get antivirus software away from the Windows kernel

In the summer of 2024, corporate anti-malware provider Crowdstrike pushed a broken update to millions of PCs and servers running some version of Microsoft's Windows software, taking down systems that both companies and consumers relied on for air travel, payments, emergency services, and their morning coffee. It was a huge outage, and it caused days and weeks of pain as the world's permanently beleaguered IT workers brought systems back online, in some cases touching each affected PC individuall

Sonic the Hedgehog Is Speeding Into ‘Magic: The Gathering’

With the success of the Final Fantasy set transitioning Magic‘s collaboration era truly into the mainstream, Wizards of the Coast is running full speed ahead with its latest collaboration: a new Secret Lair drop that will bring Sonic the Hedgehog and his friends to the game. Rather than being reprints of old cards with new art, like the case of the SpongeBob Secret Lair or the recent benefit for the National Association of Latino Arts and Cultures, the new Sonic cards, revealed by Variety today

VMware perpetual license holder receives audit letter from Broadcom

After sending cease-and-desist letters to VMware users whose support contracts had expired and who subsequently declined to subscribe to one of Broadcom’s VMware bundles, Broadcom has started the process of conducting audits on former VMware customers. Broadcom stopped selling VMware perpetual licenses in November 2023 in favor of pushing a small number of VMware SKUs that feature multiple VMware offerings. Since Broadcom is forcefully bundling VMware products, the costs associated with running

Engadget Podcast: Reviewing our favorite VPNs and M3GAN 2.0

This week, I chat with Sam Chapman, Engadget’s new security reporter who’s been reviewing VPNs and related products. He dives into what led him to security, the VPNs he likes the most and his thoughts on potential cyberattacks. Additionally, we discuss Microsoft’s latest news around the Windows 10 Extended Security Update, and Devindra explains why M3GAN 2.0 absolutely rules. Credits Host: Devindra Hardawar Guests: Sam Chapman Producer: Ben Ellman Music: Dale North and Terrence O'Brien If

Microsoft rolls out Windows security changes to prevent another CrowdStrike meltdown

Elyse Betters Picaro / ZDNET Last summer's CrowdStrike meltdown was a nightmare for network administrators worldwide, disrupting healthcare systems, cutting off access to banking systems, and grounding aircraft. All in all, the event caused billions of dollars in direct and indirect damages, and it was entirely preventable. Also: How to get Windows 10 extended security updates for free: 2 options In response, Microsoft convened a security summit, bringing together technical experts from Crowd

Microsoft is moving antivirus providers out of the Windows kernel

is a senior editor and author of Notepad , who has been covering all things Microsoft, PC, and tech for over 20 years. It’s been nearly a year since a faulty CrowdStrike update took down 8.5 million Windows-based machines around the world, and Microsoft wants to ensure such a problem never happens again. After holding a summit with security vendors last year, Microsoft is poised to release a private preview of Windows changes that will move antivirus (AV) and endpoint detection and response (ED

Unreal Amber Fossils Show ‘Last of Us’ Zombie Fungus Terrorizing Bugs During the Cretaceous

In the video game The Last of Us and its spin-off HBO series, humans fight to survive against cordyceps, a parasitic fungus that turns its hosts into zombies. While the infections are wildly dramatized in both the game and the show, these fungi aren’t mere science fiction. In fact, some species have been around since the age of the dinosaurs, a new study suggests. An international team of researchers led by Yuhui Zhuang, a doctoral student of paleontology at China’s Yunnan University, recently

WhatsApp Brings Meta AI-Powered Summaries to the Chats You Missed

Tyler Lacoma Editor / Home Security For more than 10 years Tyler has used his experience in smart home tech to craft how-to guides, explainers, and recommendations for technology of all kinds. From using his home in beautiful Bend, OR as a testing zone for the latest security products to digging into the nuts and bolts of the best data privacy guidelines, Tyler has experience in all aspects of protecting your home and belongings. With a BA in Writing from George Fox and certification in Technic

Libxml2's "no security embargoes" policy

Libxml2's "no security embargoes" policy [LWN subscriber-only content] Welcome to LWN.net The following subscription-only content has been made available to you by an LWN subscriber. Thousands of subscribers depend on LWN for the best news from the Linux and free software communities. If you enjoy this article, please consider subscribing to LWN. Thank you for visiting LWN.net! Libxml2, an XML parser and toolkit, is an almost perfect example of the successes and failures of the open-source mov

WhatsApp Brings Meta AI-Powered Summaries to Your Texts

Tyler Lacoma Editor / Home Security For more than 10 years Tyler has used his experience in smart home tech to craft how-to guides, explainers, and recommendations for technology of all kinds. From using his home in beautiful Bend, OR as a testing zone for the latest security products to digging into the nuts and bolts of the best data privacy guidelines, Tyler has experience in all aspects of protecting your home and belongings. With a BA in Writing from George Fox and certification in Technic

Enterprises must rethink IAM as AI agents outnumber humans 10 to 1

Join the event trusted by enterprise leaders for nearly two decades. VB Transform brings together the people building real enterprise AI strategy. Learn more Stolen credentials are responsible for 80% of enterprise breaches. Every major security vendor has converged on the same conclusion: Identity is now the control plane for AI security. Scale alone demands this shift. Enterprises managing 100,000 employees will handle more than one million identities when AI agents enter production. Traditi

Updating to Android 16 gives you 2 useful security features - but you need to enable them

Jack Wallen / Elyse Betters Picaro / ZDNET Google released Android 16 a bit earlier than expected, and although it was missing some crucial features, there are key additions to the platform that go a long way to improve security. This was an important step forward, as the need for improved security grows every year. Without companies like Google, Apple, and others upping the ante on security, the mobile space would wind up the wild west of the technological landscape, with ne'er-do-wells poppi

Microsoft Offers Free Windows 10 Extended Security Updates -- Under One Condition

Microsoft is closing the door on Windows 10 in October 2025, and will be ceasing security support for that operating system unless users pay $30 for a one-year extended security update. On Tuesday, with less than four months on the clock until support expires, Microsoft has added a free option. Users need to turn on cloud backup and connect it to their OneDrive account. The ability to get free updates on Windows 10 is a pretty big deal because it is still the most widely used Windows OS, accoun

Subsecond: A runtime hotpatching engine for Rust hot-reloading

§Subsecond: Hot-patching for Rust Subsecond is a library that enables hot-patching for Rust applications. This allows you to change the code of a running application without restarting it. This is useful for game engines, servers, and other long-running applications where the typical edit-compile-run cycle is too slow. Subsecond also implements a technique we call “ThinLinking” which makes compiling Rust code significantly faster in development mode, which can be used outside of hot-patching.

Data-recovery firm tests $28, 500GB HDD from Amazon and gets surprising results

Fraudulent or misleading storage devices are, unfortunately, still easy to find via online marketplaces. It's also a common story that someone buys a shockingly cheap storage device from an unknown brand and ends up with a product that doesn’t perform as expected—or at all. With this in mind, data-recovery firm Secure Data Recovery recently bought a 500GB HDD from Amazon (the UnionSine HD2510) for $28 and tested it. The results were better than expected, but there are still reasons to avoid buy

How CISOs became the gatekeepers of $309B AI infrastructure spending

Join the event trusted by enterprise leaders for nearly two decades. VB Transform brings together the people building real enterprise AI strategy. Learn more Enterprise AI infrastructure spending is expected to reach $309 billion by 2032. The winners won’t be determined by who has the best models; it’ll come down to who controls the infrastructure layer that makes AI operational at scale. Security vendors are making the most aggressive moves. Palo Alto Networks, CrowdStrike and Cisco each repo

How Today’s Pentest Models Compare and Why Continuous Wins

As threat actors grow faster, stealthier, and more persistent, the approach to pentesting needs to keep evolving. Traditional, periodic assessments no longer keep up with rapidly changing attack surfaces. Static tests offer a snapshot, but attackers see a live stream. Security testing needs to shift testing models to mirror how real-world attackers operate. At Sprocket Security, our Continuous Penetration Testing (CPT) solution is an always on, always active, and hybrid pentesting model. In th

Finding a 27-year-old easter egg in the Power Mac G3 ROM

I was recently poking around inside the original Power Macintosh G3’s ROM and accidentally discovered an easter egg that nobody has documented until now. This story starts with me on a lazy Sunday using Hex Fiend in conjunction with Eric Harmon’s Mac ROM template (ROM Fiend) to look through the resources stored in the Power Mac G3’s ROM. This ROM was used in the beige desktop, minitower, and all-in-one G3 models from 1997 through 1999. As I write this post in mid-2025, I’m having a really diff

Topics: disk image mac rom secret

US House bans WhatsApp from staff devices

In Brief The U.S. House of Representatives’ top official has banned WhatsApp from government-issued devices used by its staff, saying the app poses potential security risks, Reuters reported, citing a memo sent to House staff. “The Office of Cybersecurity has deemed WhatsApp a high risk to users due to the lack of transparency in how it protects user data, absence of stored data encryption, and potential security risks involved with its use,” Reuters reported the memo as saying. The memo inst

2 clever ways Android 16 guards your security - but you need to enable them

Jack Wallen / Elyse Betters Picaro / ZDNET Google released Android 16 a bit earlier than expected, and although it was missing some crucial features, there are key additions to the platform that go a long way to improve security. This was an important step forward, as the need for improved security grows every year. Without companies like Google, Apple, and others upping the ante on security, the mobile space would wind up the wild west of the technological landscape, with ne'er-do-wells poppi

I Solved a 7-Day Calculation Problem in a Weekend

How I Solved a 7-Day Calculation Problem in a weekend Jithin Sankar Follow 3 min read · 3 days ago 3 days ago -- Listen Share In a previous project, my team was building a SaaS application. The scenario was this: we had a slider for setting a price, from $0.00 to $10.00. When you moved the slider, the app would show you the projected sales for that price. The slider input was combined with two other attributes, Region and SKU name. The problem was performance. Each time the slider moved, it wo

Excalidraw+ Is Now SoC 2 Certified

TL;DR: Our SOC 2 Journey We got tired of endless security questionnaires, so we got SOC 2 certified to make things smoother for everyone. The process: Used Vanta to connect our services and fix compliance gaps Wrote a ton of policies Implemented zero-trust production access Upgraded our tech stack (Nx, Infisical, monitoring, VPN, etc.) Did penetration testing Evaluated all vendors Result: Passed SOC 2 Type I 🎉 In progress: Type II Next: maybe GDPR, maybe ISO 27001 (depends on demand)

Canadian telecom hacked by suspected China state group

Hackers suspected of working on behalf of the Chinese government exploited a maximum-severity vulnerability, which had received a patch 16 months earlier, to compromise a telecommunications provider in Canada, officials from that country and the US said Monday. “The Cyber Centre is aware of malicious cyber activities currently targeting Canadian telecommunications companies,” officials for the center, the Canadian government’s primary cyber security agency, said in a statement. “The responsible