Latest Tech News

Stay updated with the latest in technology, AI, cybersecurity, and more

Filtered by: ty Clear Filter

Everyone’s still throwing billions at AI data centers

From $100 billion OpenAI commitments to $100,000 visa fees, this week showed just how much the tech landscape is shifting. On the latest episode of Equity, Anthony Ha and Max Zeff unpack the AI infrastructure gold rush and tech’s talent shuffle. Watch the full episode for more about: Equity is TechCrunch’s flagship podcast, produced by Theresa Loconsolo, and posts every Wednesday and Friday. Subscribe to us on Apple Podcasts, Overcast, Spotify and all the casts. You also can follow Equity on X

TruSources to show off its on-device identity-checking tech at TechCrunch Disrupt 2025

For years, “know your customer” checks have become commonplace on the internet, often by way of sharing a copy of your government-issued ID and a selfie to confirm that it’s really you, to access a website or app, or to purchase certain goods. Nowadays, age-verification laws taking effect across the U.S., the United Kingdom, Australia, and beyond are also giving rise to an entire industry of ID-checking companies charged with granting you access to the “adult” web. But uploading your identity

Something is seriously wrong with YouTube TV multiview, users say

Joe Maring / Android Authority TL;DR For the past couple of weeks, YouTube TV users have been complaining about bad picture quality when using multiview. Numerous reports indicate that watching a single channel appears fine, but the quality severely degrades when watching two, three, or four channels at once. This is reportedly happening even with fast, wired internet connections and with other streaming apps running fine, suggesting it may be an issue with YouTube TV itself. YouTube TV’s mu

The hidden cyber risks of deploying generative AI

Organizations increasingly think it’s a great idea, even an absolute necessity, to integrate artificial intelligence into their operations. And it can be both. But many organizations don’t understand the cybersecurity risks involved with AI, and they don’t realize how unprepared they are to secure their AI deployments. Whether for internal productivity or customer-facing innovation, AI — especially generative AI — can revolutionize a business. But if they’re not secure, AI deployments can lead

These are the 10 best Galaxy Watch 8 watch faces you probably aren’t using

Joe Maring / Android Authority Whether you have a Samsung Galaxy Watch 8 or the fancier Galaxy Watch 8 Classic, both of Samsung’s newest smartwatches are among the best you can buy today. Between ultra-comfortable designs, excellent displays, and a really impressive new watch band system, Samsung checked a lot of boxes with this year’s Galaxy Watches. Part of this is also thanks to Samsung’s extensive collection of watch faces. In addition to the dozens of existing options, the Galaxy Watch 8

OnePlus confirms your texts aren’t safe from this major Oxygen OS SMS vulnerability

Joe Maring / Android Authority TL;DR OnePlus devices running Oxygen OS 12, 14, and 15 are affected by a serious SMS vulnerability that allows bad apps to secretly read messages. Devices on Oxygen OS 11 aren’t affected. OnePlus has acknowledged the flaw, but unfortunately, a fix will only roll out globally starting in October. If a OnePlus phone is your daily driver, it’s likely affected by a serious vulnerability that can allow bad apps to secretly read your text messages. Uncovered by cybe

Genode OS Framework

Introduction We understand the complexity of code and policy as the most fundamental security problem shared by modern general-purpose operating systems. Because of high functional demands and dynamic workloads, however, this complexity cannot be avoided. But it can be organized. Genode is a novel OS architecture that is able to master complexity by applying a strict organizational structure to all software components including device drivers, system services, and applications. The Genode OS fr

Best Solar-Powered Home Security Cameras for 2025

What are the costs for either storage option? Do you prefer online storage or more private local storage? Your camera won't be effective if the only footage being recorded is grainy and unreadable. You don't want anyone peeping on your property or hacking into your camera. Some are more susceptible than others. CNET staff -- not advertisers, partners or business interests -- determine how we review products and services. If you buy through our links, we may earn a commission. Have you ever e

Exploit allows for takeover of fleets of Unitree robots

A critical vulnerability in the Bluetooth Low Energy (BLE) Wi-Fi configuration interface used by several different Unitree robots can result in a root level takeover by an attacker, security researchers disclosed on 20 September. The exploit impacts Unitree’s Go2 and B2 quadrupeds and G1 and H1 humanoids. Because the vulnerability is wireless, and the resulting access to the affected platform is complete, the vulnerability becomes wormable, say the researchers, meaning “an infected robot can sim

Investigating a Forged PDF

SECURITY: The security deposit will secure the performance of Tenant’s obligations. IER may, but will not be obligated to, apply all portions of said deposit on account of Tenant’s obligations. Any balance remaining upon termination will be returned to Tenant. Tenant will not have the right to apply the security deposit in payment of the last month’s rent. Security deposit held at IER Trust Account. dump_data base.pdf sha256sum

Exploit Allows for Takeover of Fleets of Unitree Robots

A critical vulnerability in the Bluetooth Low Energy (BLE) Wi-Fi configuration interface used by several different Unitree robots can result in a root level takeover by an attacker, security researchers disclosed on 20 September. The exploit impacts Unitree’s Go2 and B2 quadrupeds and G1 and H1 humanoids. Because the vulnerability is wireless, and the resulting access to the affected platform is complete, the vulnerability becomes wormable, say the researchers, meaning “an infected robot can sim

Call-recording app Neon goes offline after security flaw uncovered

Neon is an call-recording app that pays users for access to the audio, which the app in turn sells to AI companies for training their models. Since its launch last week, it quickly rose in popularity, but the service was taken offline today. TechCrunch reported that it found a security flaw that allowed any logged-in user to access other accounts' phone numbers, the phone numbers called, call recordings and transcripts. TechCrunch said that it contacted Neon founder Alex Kiam about the issue. "

Unofficial Postmark MCP npm silently stole users' emails

A npm package copying the official ‘postmark-mcp’ project on GitHub turned bad with the latest update that added a single line of code to exfiltrate all its users' email communication. Published by a legitimate-looking developer, the malicious package was a perfect replica of the authentic one in terms of code and description, appearing as an official port on npm for 15 iterations. Model Context Protocol (MCP) is an open standard that allows AI assistants to interface with external tools, APIs

Viral call-recording app Neon goes dark after exposing users’ phone numbers, call recordings, and transcripts

A viral app called Neon, which offers to record your phone calls and pay you for the audio so it can sell that data to AI companies, has rapidly risen to the ranks of the top-five free iPhone apps since its launch last week. The app already has thousands of users and was downloaded 75,000 times yesterday alone, according to app intelligence provider Appfigures. Neon pitches itself as a way for users to make by providing call recordings that help train, improve, and test AI models. But now Neon

Identity Types

Previously: Models of (Dependent) Type Theory. There is a deep connection between mathematics and programming. Computer programs deal with such mathematical objects as numbers, vectors, monoids, functors, algebras, and many more. We can implement such structures in most programming languages. For instance, here’s the definition of natural numbers in Haskell: data Nat where Z :: Nat -- zero S :: Nat -> Nat -- successor There is a problem, though, with encoding the laws that they are supposed t

Android Remote Lock stops letting anyone who knows your number lock your phone

Hadlee Simons / Android Authority TL;DR Remote Lock lets you remotely secure a lost or stolen phone. So far, all you’ve needed to activate it was your phone number — so anyone who knew it could potentially lock your phone. That’s now slightly more secure with the addition of an optional security question. Google offers plenty of automatic ways to try and limit your exposure when someone takes off with your smartphone. Features like Theft Detection use sensors to know when a thief grabs your

Microsoft pressured to extend free Windows 10 security updates in most of Europe

Score another win for EU consumers. On Wednesday, Microsoft backtracked on the strings it had attached to Windows 10's Extended Security Updates (ESU) program. However, it only did so in the European Economic Area (EEA) following complaints from an advocacy group. The elephant in the room? The EU's Digital Markets Act (DMA) safeguards against unlawful bundling and restricting consumer choice. Had the company not relented, those regulations could have spawned investigations and hefty fines. "In

Cisco warns of ASA firewall zero-days exploited in attacks

Cisco warned customers today to patch two zero-day vulnerabilities that are actively being exploited in attacks and impact the company's firewall software. The first one (CVE-2025-20333) allows authenticated, remote attackers to execute arbitrary code on devices running vulnerable Adaptive Security Appliance (ASA) and Firewall Threat Defense (FTD) software, while the second (CVE-2025-20362) enables remote attackers to access restricted URL endpoints without authentication. "The Cisco Product S

New element Web and desktop design

The brand new updates of the Element Web and Desktop apps include a major rework of room listings. It brings the ‘laptop and PC versions’ of the Element apps in line with the Element X design on mobile devices to give a far sleeker experience. This update marks the first step in a broader evolution of Element Web and Desktop — one that brings consistency across platforms, improves accessibility, and lays the groundwork for a more resilient technical foundation. In short: it’s simpler, faster, a

How AI safety took a backseat to military money

is The Verge’s senior AI reporter. An AI beat reporter for more than five years, her work has also appeared in CNBC, MIT Technology Review, Wired UK, and other outlets. Posts from this author will be added to your daily email digest and your homepage feed. Hey there, and welcome to Decoder! I’m Hayden Field, senior AI repoter at The Verge — and your Thursday episode guest host. I have another couple of shows for you while Nilay is out on parental leave, and we’re going to be spending more time

Death rates rose in hospital ERs after private equity firms took over

After hospitals were acquired by private equity firms, patient death rates in the emergency departments rose by 13% compared with similar hospitals, according to research published this week in Annals of Internal Medicine. The research, which compared outcomes at hospitals over a 10-year period, adds fresh evidence to previous studies showing harmful patient outcomes and higher costs among health care entities owned by profit-oriented financiers. The increased deaths in emergency departments a

As many as 2M Cisco devices affected by actively exploited 0-day

As many as 2 million Cisco devices are susceptible to an actively exploited zeroday that can remotely crash or execute code on vulnerable systems. Cisco said Wednesday that the vulnerability, tracked as CVE-2025-20352, was present in all supported versions of Cisco IOS and Cisco IOS XE, the operating system that powers a wide variety of the company’s networking devices. The vulnerability can be exploited by low-privileged users to create a denial-of-service attack or by higher-privileged users

If Your 'Gravity Falls'-Obsessed Kid Needs Something More Grown Up, I Have a Netflix Show for You

Each week, Netflix drops a list of the top 10 films and TV shows dominating the platform, and for the week ending Sept. 21, the animated series Haunted Hotel crept onto the list of most-watched shows. Haunted Hotel isn't necessarily an "adult animation" series the way that something like Big Mouth or BoJack Horseman is, and it doesn't deal with especially adult or raunchy themes, but it's also not targeted at young kids. The comedy series was created by Rick & Morty writer Matt Roller and it ce

Microsoft will offer free Windows 10 security updates in Europe

Microsoft will offer free extended security updates for Windows 10 users in the European Economic Area (EEA), which includes Iceland, Liechtenstein, Norway, and all 27 European Union member states. This announcement follows Microsoft's statement in June that customers will be able to enroll in the Extended Security Updates (ESU) program at no additional cost, using their Microsoft Rewards points or by enabling Windows Backup. The company took this decision following pressure from Euroconsumers

As many as 2 million Cisco devices affected by actively exploited 0-day

As many as 2 million Cisco devices are susceptible to an actively exploited zeroday that can remotely crash or execute code on vulnerable systems. Cisco said Wednesday that the vulnerability, tracked as CVE-2025-20352, was present in all supported versions of Cisco IOS and Cisco IOS XE, the operating system that powers a wide variety of the company’s networking devices. The vulnerability can be exploited by low-privileged users to create a denial-of-service attack or by higher-privileged users

Proton Mail’s updated app adds an offline mode

is a news writer who covers the streaming wars, consumer tech, crypto, social media, and much more. Previously, she was a writer and editor at MUO. Posts from this author will be added to your daily email digest and your homepage feed. Proton has launched a major update for its encrypted Mail app, which not only adds a refreshed layout but also includes a new offline mode. That means you’ll now have full access to your inbox when you don’t have an internet connection, giving you the ability to

Bundler Belongs to the Ruby Community

Bundler belongs to the Ruby community I’ve spent 15 years of my life working on Bundler. When I introduce myself, people say “oh, the Bundler guy?”, and I am forced to agree. I didn’t come up with the original idea for Bundler (that was Yehuda). I also didn’t work on the first six months worth of prototypes. That was all Carl and Yehuda together, back when “Carlhuda” was a super-prolific author of Ruby libraries, including most of the work to modularize Rails for version 3. I joined the team

Some interesting stuff I found on IX LANs

Sep 25 2025 Some interesting stuff I found on IX LANs These days the internet as a whole is mostly constructed out of point to point ethernet circuits, meaning an ethernet interface (mostly optical) attached directly from one routing device to another routing device. However that is not always the case, as the humble “internet exchange” (IX) still exists, and while the relevancy of IXs are progressively being diminished by the internet increasingly being concentrated into a small handful of c

Microsoft forced to make Windows 10 extended security updates truly free in Europe

is a senior editor and author of Notepad , who has been covering all things Microsoft, PC, and tech for over 20 years. Posts from this author will be added to your daily email digest and your homepage feed. Windows 10 end of support is approaching in less than three weeks, and Microsoft has now been forced to make its extended security updates truly free, without a catch, in certain markets in Europe. When Windows 10 goes end of support on October 14th, some European customers will no longer b

Kali Linux 2025.3 released with 10 new tools, Wi-Fi enhancements

Kali Linux has released version 2025.3, the third version of 2025, featuring ten new tools, Nexmon support, and NetHunter improvements. Kali Linux is a distribution created for cybersecurity professionals and ethical hackers to conduct red team exercises, penetration testing, security audits, and research against networks. New tool added to Kali Linux 2025.3 As with every release, Kali Linux comes with new toys to play with. With this release, we have ten new tools, which are listed below: