Latest Tech News

Stay updated with the latest in technology, AI, cybersecurity, and more

Filtered by: ty Clear Filter

Edward Burtynsky's monumental chronicle of the human impact on the planet

If there was one absence in Burtynsky’s account of our time, however, it was the single greatest result of all that mining, burning, and consuming: the transformation of the atmosphere. Nothing else comes close in scale to the chemical disruption of the air—the flood of CO 2 now rapidly overheating the Earth and producing a series of changes so titanic they dwarf even the forces that these photos depict. But carbon dioxide is invisible, which is a problem for photographers. That’s why in some w

Jack Dorsey’s New App Just Hit a Very Embarrassing Snag

Serial entrepreneur Jack Dorsey, who cofounded Twitter, Block, and Bluesky, has started yet another new app — and this one's got an embarrassing secret. As TechCrunch reports, Dorsey's new open source messaging app, Bitchat, is supposed to be decentralized, private, and secure. There's only one problem: the Bluetooth-based app, by the venture's admission, is probably lacking in that key regard. "This software has not received external security review and may contain vulnerabilities and does n

Jank is C++

jank is C++ If you've wondered how much a solo dev can build for seamless C++ interop on a quarter, you're about to find out. In April, jank was unable to reach into C++ at all. Toward the end of this post, I'll show some real world examples of what works today. Before that, though, I want to say thank you for the sponsorship this quarter, not only by all of my individual Github sponsors, but also by Clojurists Together. I also want to say thank you to Vassil Vassilev and Lang Hames for buildin

Topics: cpp ftxui jank std type

Apple @ Work: Passkey portability is finally here in iOS 26 and macOS Tahoe 26

Apple @ Work is exclusively brought to you by Mosyle, the only Apple Unified Platform. Mosyle is the only solution that integrates in a single professional-grade platform all the solutions necessary to seamlessly and automatically deploy, manage & protect Apple devices at work. Over 45,000 organizations trust Mosyle to make millions of Apple devices work-ready with no effort and at an affordable cost. Request your EXTENDED TRIAL today and understand why Mosyle is everything you need to work with

Malware found in official gravityforms plugin indicating supply chain breach

Update 7-12-2025 06:00 UTC: We have observed some activity in regard to one of the backdoors that involves a gf_api_token parameter. The IP address 193.160.101.6 tries to request, for every site, the following URLs with a spoofed user agent: /wp-content/plugins/gravityforms_2.9.12/notification.php?gf_api_token=Cx3VGSwAHkB9yzIL9Qi48IFHwKm4sQ6Te5odNtBYu6Asb9JX06KYAWmrfPtG1eP3&action=ping /wp-content/plugins/gravityforms_2.9.11.1/notification.php?gf_api_token=Cx3VGSwAHkB9yzIL9Qi48IFHwKm4sQ6Te5odNt

The Best Co-op Games for Every Situation

Cooperative play is intrinsic to gaming. Some of my earliest (and best) gaming memories are of hours-long gaming sessions with friends. There's a reason why Hazelight Studios' Split Fiction and It Takes Two were so well received -- people love playing games with others. Bonus points if you don't need two copies of the game, or can do so from the same couch. Whether you're looking for a couch co-op or logging in with others across the internet, these are the best games to jump into with your fri

Malware Found in Official GravityForms Plugin Indicating Supply Chain Breach

Update 8-11-2025 06:00 UTC: We have observed some activity in regard to one of the backdoors that involves a gf_api_token parameter. The IP address 193.160.101.6 tries to request, for every site, the following URLs with a spoofed user agent: /wp-content/plugins/gravityforms_2.9.12/notification.php?gf_api_token=Cx3VGSwAHkB9yzIL9Qi48IFHwKm4sQ6Te5odNtBYu6Asb9JX06KYAWmrfPtG1eP3&action=ping /wp-content/plugins/gravityforms_2.9.11.1/notification.php?gf_api_token=Cx3VGSwAHkB9yzIL9Qi48IFHwKm4sQ6Te5odNt

How passkeys work: Going passwordless with public key cryptography

Vitalii Gulenok/Getty Images For the last five years, the FIDO Alliance -- led by Apple, Microsoft, and Google (with other companies in tow) -- has been blazing a trail toward a future where passwords are no longer necessary in order to login to our favorite websites and apps. This so-called passwordless future is based on a new form of login credential known as the passkey, which itself is largely based on another technology -- public key cryptography -- that's been around for decades. Why t

I tried Perplexity's Comet AI browser - here's what you need to know

Nazarii Neshcherenskyi/Getty Perplexity Comet isn't the first AI-powered web browser to arrive. That honor goes to Dia, but thanks to the popularity of Perplexity as an AI-enabled search engine and chatbot, it's getting a lot of attention. It deserves it. An agentic browser, Comet isn't just a web browser with AI glued to it, as are Chrome with Gemini and Edge with Copilot. It's designed from the ground up to use AI to automate tasks and improve your workflow. Also: Perplexity's Comet AI brow

As Zuck Races to Build Godlike AI, Women and People of Color Aren’t Invited

Mark Zuckerberg has a new mission: build artificial general intelligence (AGI), a form of AI that can reason and learn like a human.To do that, he’s assembled an elite team of researchers, engineers, and AI veterans from OpenAI, Google, Anthropic, Apple, and more. This new unit, called Meta Superintelligence Labs (MSL), is tasked with building the most powerful artificial intelligence the world has ever seen. The tech world is calling it a “dream team.” But it’s hard not to notice what’s missin

Google Contacts just got two upgrades that’ll help you clean up your address book

Harley Maranan / Android Authority TL;DR Google Contacts has recently started rolling out a couple changes we spotted in development earlier this year. Contact pages are picking up a new “Recent activity” list, displaying message and call history. The app’s settings add a new toggle to control whether or not you see view-only contacts from other apps. Our phones are full of apps we don’t spend nearly enough time paying attention to, yet are critical for everything we do with them on a day-to

WordPress Gravity Forms developer hacked to push backdoored plugins

The popular WordPress plugin Gravity Forms has been compromised in what seems a supply-chain attack where manual installers from the official website were infected with a backdoor. Gravity Forms is a premium plugin for creating contact, payment, and other online forms. Based on statistic data from the vendor, the product is isntalled on around one million websites, some belonging to well-known organizations like Airbnb, Nike, ESPN, Unicef, Google, and Yale. Remote code execution on the server

Exploits for pre-auth Fortinet FortiWeb RCE flaw released, patch now

Proof-of-concept exploits have been released for a critical SQLi vulnerability in Fortinet FortiWeb that can be used to achieve pre-authenticated remote code execution on vulnerable servers. FortiWeb is a web application firewall (WAF), which is used to protect web applications from malicious HTTP traffic and threats. The FortiWeb vulnerability has a 9.8/10 severity score and is tracked as CVE-2025-25257. Fortinet fixed it last week in FortiWeb 7.6.4, 7.4.8, 7.2.11, and 7.0.11 and later versio

Mystery Man Shines a Spotlight on the Shadiness of Trump’s Crypto Venture

Last month, the Aqua 1 Foundation, founded by Dave Lee, purchased $100 million worth of tokens from the Trump family’s cryptocurrency venture World Liberty Financial (WLF. Someone putting cash directly into the President’s coffers is a normal thing in the Trump era, but there’s something odd about this particular purchase. According to Reuters, Aqua 1 is now the largest publicly known holder of World Liberty Financial tokens, but no one seems to know what the business is or who runs it. Aqua 1

jank is C++

jank is C++ If you've wondered how much a solo dev can build for seamless C++ interop on a quarter, you're about to find out. In April, jank was unable to reach into C++ at all. Toward the end of this post, I'll show some real world examples of what works today. Before that, though, I want to say thank you for the sponsorship this quarter, not only by all of my individual Github sponsors, but also by Clojurists Together. I also want to say thank you to Vassil Vassilev and Lang Hames for buildin

Topics: cpp ftxui jank std type

jank Is C++

jank is C++ If you've wondered how much a solo dev can build for seamless C++ interop on a quarter, you're about to find out. In April, jank was unable to reach into C++ at all. Toward the end of this post, I'll show some real world examples of what works today. Before that, though, I want to say thank you for the sponsorship this quarter, not only by all of my individual Github sponsors, but also by Clojurists Together. I also want to say thank you to Vassil Vassilev and Lang Hames for buildin

Topics: cpp ftxui jank std type

CISA warns hackers are actively exploiting critical ‘Citrix Bleed 2’ security flaw

U.S. cybersecurity agency CISA says hackers are actively exploiting a critical-rated security flaw in a widely used Citrix product, and has given other federal government departments just one day to patch their systems. Security researchers have dubbed the bug “Citrix Bleed 2” for its similarity to a 2023 security flaw in Citrix NetScaler, a networking product that large companies and governments rely on for allowing their staff to remotely access apps and other resources on their internal netw

CISA confirms hackers are actively exploiting critical ‘Citrix Bleed 2’ bug

U.S. cybersecurity agency CISA says hackers are actively exploiting a critical-rated security flaw in a widely used Citrix product, and has given other federal government departments just one day to patch their systems. Security researchers have dubbed the bug “Citrix Bleed 2” for its similarity to a 2023 security flaw in Citrix NetScaler, a networking product that large companies and governments rely on for allowing their staff to remotely access apps and other resources on their internal netw

Security Bite: Fake iPhone virus pop-ups have made it on YouTube

9to5Mac Security Bite is exclusively brought to you by Mosyle, the only Apple Unified Platform. Making Apple devices work-ready and enterprise-safe is all we do. Our unique integrated approach to management and security combines state-of-the-art Apple-specific security solutions for fully automated Hardening & Compliance, Next Generation EDR, AI-powered Zero Trust, and exclusive Privilege Management with the most powerful and modern Apple MDM on the market. The result is a totally automated Appl

CISA tags Citrix Bleed 2 as exploited, gives agencies a day to patch

The U.S. Cybersecurity & Infrastructure Security Agency has confirmed active exploitation of the CitrixBleed 2 vulnerability (CVE-2025-5777) in Citrix NetScaler ADC and Gateway and is giving federal agencies one day to apply fixes. Such a short deadline for installing the patches is unprecedented since CISA released the Known Exploited Vulnerabilities (KEV) catalog, showing the severity of the attacks exploiting the security issue. The agency added the flaw to its Known Exploited Vulnerabiliti

My favorite indoor security camera has no subscription fees and is 39% off for Prime Day

ZDNET's key takeaways The Eufy Security Indoor Cam S350 is available for purchase at $130. The S350 indoor camera features dual telephoto and wide-angle lenses with 360-degree motion tracking and optional local storage to avoid monthly fees. The only drawback I've found is that I wish the camera had a button to engage privacy mode manually, but you can schedule it as needed on the app. View now at Amazon The Eufy Security Indoor Cam S350 has no subscription fees and all the privacy settings y

AI chatbot’s simple ‘123456’ password risked exposing personal data of millions of McDonald’s job applicants

In Brief Security researchers found that they could access the personal information of 64 million people who had applied for a job at McDonald’s, in large part by logging into the company’s AI job hiring chatbot with the username and password “123456.” Ian Carroll and Sam Curry wrote in a blog post that “during a cursory security review of a few hours,” they found the password issue and another simple security vulnerability in an internal API, which allowed access to job applicants’ past conve

Cybersecurity’s global alarm system is breaking down

Cybersecurity practitioners have since flooded Discord channels and LinkedIn feeds with emergency posts and memes of “NVD” and “CVE” engraved on tombstones. Unpatched vulnerabilities are the second most common way cyberattackers break in, and they have led to fatal hospital outages and critical infrastructure failures. In a social media post, Jen Easterly, a US cybersecurity expert, said: “Losing [CVE] would be like tearing out the card catalog from every library at once—leaving defenders to sor

Elon Musk's Bizarre Behavior May Force Tesla Board to Step in, Analyst Warns

Elon Musk needs no introduction. But unless you've been keeping up with all the bizarre AI scandals, Tesla disasters, and public crash outs, you may need a refresher. Following Musk's extremely high-profile feud with his former best buddy, president Donald Trump, the Tesla CEO has been struggling to find his way forward in the world. For months, Tesla investors and insiders alike have been begging the world's richest man to take a step back from politics and focus on his company, which has bee

How passkeys work: Let's start the passkey registration process

Photoraidz/Getty Images Previously on our passkey journey, I talked about the challenge of figuring out if a relying party -- typically, the operator of a website or app -- even offers the ability to sign in with a passkey instead of the more traditional and less secure username and password-based approach. Some of the biggest relying parties in the world -- including Apple, Google, and Microsoft -- support passkeys as a means of passwordless authentication. Together, these tech giants can int

$8.8 trillion protected: How one CISO went from ‘that’s BS’ to bulletproof in 90 days

Want smarter insights in your inbox? Sign up for our weekly newsletters to get only what matters to enterprise AI, data, and security leaders. Subscribe Now VentureBeat’s exclusive interview with Sam Evans, CISO of Clearwater Analytics, reveals why enterprise browsers are quickly becoming the frontline defense against shadow AI in its many forms. Evans faced a critical challenge in October 2023. Standing before Clearwater Analytics’ board, he had to confront concerns that employees might inadv

Co-founder exiting after pivot – what's a fair exit package?

Throwaway for obvious reasons. I’m a co-founder of a venture-backed startup currently valued at ~$20M. We raised a strong pre-seed, built a team, shipped v1, generated revenue, and recently pivoted into a related idea that I think could work—but I’m no longer the right person to lead it. My co-founder is passionate about the new direction and wants to take it forward. I want to step away cleanly and with integrity. I have ~10% vested. I led our early fundraise, worked unpaid for months, and con

Tesla moves to expand Robotaxi to Phoenix, following rival Waymo

Elon Musk's Tesla has applied to test and eventually deploy its Robotaxi vehicles in Phoenix, Arizona, following in the footsteps of market leader Waymo. Tesla has applied to conduct autonomous vehicle testing and operations, with and without human safety drivers on board, in Arizona, a spokesperson for the Arizona Department of Transportation told CNBC on Thursday. A decision on the application is expected at the end of July, and Tesla has "expressed interest in operating within the Phoenix Me

Best TVs We've Tested (July 2025)

The Sony Bravia 8 II is a new flagship OLED David Katzmaier/CNET With all of the TVs available today, and all of the technical terms and jargon associated with television technology, it can be tough to figure out what's important. Here's a quick guide to help cut through the confusion. Picture quality: Broadly speaking, the type of display technology helps dictate how good a TV's picture quality is, but OLED is typically the best display technology, and this is followed by LCD (including QLED,

Nintendo is getting rid of its money-saving Game Vouchers program

Nintendo games famously don’t tend to go down in price all that much, but original Switch owners were able to save money on eligible first-party-published titles by taking advantage of the company’s Switch Game Voucher program. But that won’t be the case for much longer, with Nintendo today announcing that the vouchers in question will no longer be sold after January 30 2026 . Currently, Game Vouchers can be purchased as a pair for $99.98, which you then redeem on select digital titles, from Sw