Latest Tech News

Stay updated with the latest in technology, AI, cybersecurity, and more

Filtered by: acc Clear Filter

Kanye’s Crypto Journey Gets Significantly Weirder

Kanye West (or Ye, as he’s known now) last week announced his first foray into the cryptocurrency industry with what his X account said was a new memecoin, YZY. “The official Yeezy token just dropped,” said a bored-looking West in a video posted on his X account. This, in and of itself, was somewhat bizarre (West had previously sworn off memecoins) and some web users speculated that the video may have been AI-generated. The coin immediately skyrocketed in value, climbing—in the span of a few ho

iPhone 17 announcement imminent as alleged Apple Event ‘hashmoji’ surfaces

Update: 9to5Mac has confirmed this information. Apple is expected to officially announce its September iPhone 17 event as soon as today. An alleged “hashmoji” on X has appeared, building on that expectation. The #AppleEvent hashmoji, according to an X account dedicated to finding these, shows an Apple logo with what appears to be a thermal imaging view inside. The account further claims that the hashmoji will go live at 9 am PT/12pm ET. This might be our first look at the event theme, assumin

Ether slides to start the week after hitting a fresh record near $5,000

Ether tumbled to start the week, erasing gains from its Jackson Hole rally after hitting a fresh record over the weekend. On Monday, the price of the second largest cryptocurrency fell 8% to $4,431.60, according to Coin Metrics. On Sunday, it rose to an all-time high of $4,954.81, after hitting an earlier record Friday for the first time since 2021. Meanwhile, bitcoin fell 2% to $110,531.00, its lowest level since July. The flagship cryptocurrency hit its most recent record of $124,496 on Aug.

An illustrated guide to OAuth

OAuth was first introduced in 2007. It was created at Twitter because Twitter wanted a way to allow third-party apps to post tweets on users' behalf. Take a second to imagine designing something like that today. How would you do it? One way would just be to ask the user for their username and password. So you create an unofficial Twitter client, and present the user a login screen that says "log in with Twitter". The user does so, but instead of logging into Twitter, they're actually sending the

Ether pulls back to start the week after hitting a fresh record near $5,000

Ether is pulling back to start the week, after hitting a fresh record over the weekend. On Monday, the price of the second largest cryptocurrency fell 4% to $4,631.61, according to Coin Metrics, trading off its lows of the day. On Sunday, it rose to a fresh record of $4,954.81, after hitting an earlier all-time high Friday for the first time since 2021. Meanwhile, bitcoin was little changed at $112,488.80. Over the weekend, it dropped to $110,779.01, its lowest level since July 10. The flagshi

Report: RFK Jr. and Trump to Pull Covid-19 Vaccines ‘Within Months’

Robert F. Kennedy Jr.’s anti-vaxxer allies are pulling for him to destroy the covid-19 shots once and for all. A purported close ally of the health secretary has claimed that Kennedy and President Donald Trump are preparing to imminently shelve the mRNA covid-19 vaccines. British cardiologist and RFK Jr. advisor Aseem Malhotra was interviewed by the Daily Beast for an article published Monday morning. In it, Malhotra states that the Trump administration will attempt to pull the mRNA-based vacci

Defending against malware persistence techniques with Wazuh

Malware persistence techniques enable attackers to maintain access to compromised endpoints despite system reboots, credential changes, or other disruptions. Common methods include altering configurations, injecting startup code, and hijacking legitimate processes. These approaches ensure the malware or attacker remains active, allowing malicious activities to continue without the need for re-exploitation. In this article, we will examine the nature of malware persistence techniques, their imp

An Illustrated Guide to OAuth

OAuth was first introduced in 2007. It was created at Twitter because Twitter wanted a way to allow third-party apps to post tweets on users' behalf. Take a second to imagine designing something like that today. How would you do it? One way would just be to ask the user for their username and password. So you create an unofficial Twitter client, and present the user a login screen that says "log in with Twitter". The user does so, but instead of logging into Twitter, they're actually sending the

Ether erases gains from Jackson Hole rally after hitting a fresh record over the weekend

Ether is pulling back to start the week, after hitting a fresh record over the weekend. The price of the second largest cryptocurrency fell 6% to $4,548.32 on Monday, according to Coin Metrics. On Sunday, it rose to a fresh record of $4,954.81, after hitting an earlier all-time high Friday for the first time since 2021. Meanwhile, bitcoin was last lower by more than 1% at $111,501.74. Over the weekend, it dropped to $110,779.01, its lowest level since July 10. The flagship cryptocurrency hit i

Xero vs. QuickBooks: Which accounting platform is better?

Allison Murray/ZDNET If you're trying to select an accounting platform that will grow with your business while managing costs effectively, both Xero and QuickBooks offer competing products starting at $29 per month. However, they're each good at different things. Also: The best budgeting apps of 2025 Xero stands out for its user-friendly interface and flexible pricing structure that includes unlimited users across all plans. The platform excels in international business support with multicurr

2.5B Gmail users endangered after Google database hack

How the phishing attacks work Initial reports of attempted attacks have already been seen on Reddit, which are likely related to the data leak. Users describe how alleged Google employees have contacted them by phone to inform them of a security breach in their accounts. In these scam attempts, attackers are trying to take over Gmail accounts by triggering alleged “account resets” and then intercepting passwords to subsequently lock out the account holders. Another attack method involves “dang

Notion’s offline mode might just make me ditch Obsidian

Dhruv Bhutani / Android Authority Notion is one of my favorite tools. From databases to to-do lists, tracking restaurants I wanted to check out, and so much more, I’ve dabbled in it for years until I finally made the switch to Obsidian. That’s mostly because of Notion’s one fatal flaw. The moment you lose internet, the app effectively becomes useless. The moment you lose internet, the app effectively becomes useless. I’ve learned that the hard way on flights, cafes with rocky Wi-Fi, even when

Germany's Copyright Clearing House now requires courts for website blocks

After more than four years of work, the Copyright Clearing House for the Internet (Clearingstelle Urheberrecht im Internet, CUII), established in 2021, has declared itself "successful in the fight against criminal business models on the Internet." At the same time, it is responding to one of the main points of criticism, namely that a private body imposes restrictions on websites that are sensitive in terms of fundamental rights, largely unchecked and behind closed doors. The procedure is now to

Bluesky blocks Mississippi due to its new age verification law

Users with Mississippi IP addresses can no longer access the Bluesky app. The decentralized social media network has explained in a post that Mississippi's new age verification law for social networks "would fundamentally change" how it operates, and it wouldn't be possible to comply with its small team and limited resources. Bluesky says that while it does follow the UK's Online Safety Act, it works very differently from Mississippi's approach to age verification. In the UK, it's only required

TikTok puts hundreds of UK content moderator jobs at risk

TikTok puts hundreds of UK content moderator jobs at risk 22 hours ago Share Save Tom Gerken Technology reporter Share Save Getty Images TikTok is putting hundreds of jobs in the UK which moderate content that appears on the social media platform at risk. According to TikTok, the plan would see work moved to its other offices in Europe as it invests in the use of artificial intelligence (AI) to scale up its moderation. "We are continuing a reorganisation that we started last year to strengthe

Murky Panda hackers exploit cloud trust to hack downstream customers

A Chinese state-sponsored hacking group known as Murky Panda (Silk Typhoon) exploits trusted relationships in cloud environments to gain initial access to the networks and data of downstream customers. Murky Panda, also known as Silk Typhoon (Microsoft) and Hafnium, is known for targeting government, technology, academic, legal, and professional services organizations in North America. The hacking group, under its numerous names, has been linked to numerous cyberespionage campaigns, including

Got a scary T-Mobile text about your account? Here’s what it really means

Joe Maring / Android Authority TL;DR T-Mobile sent a text about “Authorized Users” that some customers mistook as a fraud warning. It was confirmed to be a mass informational campaign, not an unauthorized purchase attempt. It’s not the first eyebrow-raising SMS from the carrier this month. If you’re on T-Mobile, you might be starting to get a bit concerned about the carrier’s comms strategy. Following a security-related text from the carrier earlier this month that looked scammy but was real

Join Our Next Livestream: Back to School in the Age of AI

Everyone has a stake in how tech is shaping education today. From the tech moguls and venture capitalists who are starting “microschools” and building ed-tech tools to policymakers who are writing bills to safeguard kids online and teachers who are getting creative about using AI for school. WIRED explored all this and more in our recent back-to-school digital edition, and we're excited to talk about it at our next subscriber-only livestream on Thursday, August 28, at 1 pm ET / 10 am PT / 6 pm

Being “Confidently Wrong” is holding AI back

The reason humans are so useful is not mainly their raw intelligence. It’s their ability to build up context, interrogate their own failures, and pick up small improvements and efficiencies as they practice a task - "Why I don't think AGI is right around the corner", Dwarkesh Patel In this post, based on our recent experiences selling 7-figure AI deals to Fortune 500s and Silicon Valley tech cos alike, I'll discuss how "confident inaccuracy" seems to be at the heart of this problem. Being C

X pulls the ability to like and follow from its developer API’s free tier

In an effort to cut down on abuse and fake engagement, Elon Musk’s X is removing access to two key features of its developer API for those on the free plan. Now, free users will no longer be able to use the API to like posts on behalf of a user, nor follow other users. The company says these changes will help protect X’s platform from “spam, bots, and manipulative activities” that degrade the user experience. Developers on paid plans like the Basic, Pro, or Enterprise tiers will be unaffected.

TikTok to lay off hundreds of UK content moderators

TikTok to lay off hundreds of UK content moderators 30 minutes ago Share Save Tom Gerken Technology reporter Share Save Getty Images TikTok is planning to lay off hundreds of staff in the UK which moderate the content that appears on the social media platform. According to TikTok, the plan would see work moved to its other offices in Europe as it invests in the use of artificial intelligence (AI) to scale up its moderation. "We are continuing a reorganisation that we started last year to stre

Being confidently wrong is holding AI back

The reason humans are so useful is not mainly their raw intelligence. It’s their ability to build up context, interrogate their own failures, and pick up small improvements and efficiencies as they practice a task - "Why I don't think AGI is right around the corner", Dwarkesh Patel In this post, based on our recent experiences selling 7-figure AI deals to Fortune 500s and Silicon Valley tech cos alike, I'll discuss how "confident inaccuracy" seems to be at the heart of this problem. Being C

Dev gets 4 years for creating kill switch on ex-employer's systems

A software developer has been sentenced to four years in prison for sabotaging his ex-employer's Windows network with custom malware and a kill switch that locked out employees when his account was disabled. Davis Lu, 55, a Chinese national living legally in Houston, worked for an Ohio-based company, reportedly Eaton Corporation, from 2007 until his termination in 2019. After a corporate restructuring and subsequent demotion in 2018, the DOJ says that Lu retaliated by embedding malicious code

Tesla Takes So Long to Report Crash Data, Even Trump’s Regulators Are Taking Notice

It turns out it’s actually possible for a corporation to drag its feet for so long that even the Trump administration takes issue with it. The National Highway Traffic Safety Administration announced that it will investigate Tesla’s habit of taking months to submit accident reports that involve the company’s driver-assistance technology, according to a report from Reuters. Just how late is Tesla getting its crash report information to the NHTSA? The agency asks that companies submit reports wit

Tesla faces U.S. auto safety probe over faulty crash reporting

Elon Musk, CEO of SpaceX and Tesla, attends the Viva Technology conference at the Porte de Versailles exhibition center in Paris on June 16, 2023. Elon Musk's Tesla is facing a federal probe by the National Highway Traffic Safety Administration after the U.S. auto safety agency found that the company was not reporting crashes as required. According to documents posted to NHTSA's website on Thursday, the agency's Office of Defects Investigation had "identified numerous incident reports" from Te

China’s Great Firewall Mysteriously Severed Connection to the World for an Hour

For about an hour on Wednesday, China appeared to go dark—or at least internet access across the country did. According to an analysis published by the Great Firewall Report, a group that monitors internet censorship efforts in China, something happened in the wee hours of Wednesday morning that resulted in China blocking almost all traffic to TCP port 443, the standard port for HTTPS traffic. Between the hours of 12:34 and 1:48 AM in Beijing, someone was observed “unconditionally injecting for

In a first, Google has released data on how much energy an AI prompt uses

Earlier this year, MIT Technology Review published a comprehensive series on AI and energy, at which time none of the major AI companies would reveal their per-prompt energy usage. Google’s new publication, at last, allows for a peek behind the curtain that researchers and analysts have long hoped for. The study focuses on a broad look at energy demand, including not only the power used by the AI chips that run models but also by all the other infrastructure needed to support that hardware. “W

In a first, Google has released data on how much energy an AI prompt uses

Earlier this year, MIT Technology Review published a comprehensive series on AI and energy, at which time none of the major AI companies would reveal their per-prompt energy usage. Google’s new publication, at last, allows for a peek behind the curtain that researchers and analysts have long hoped for. The study focuses on a broad look at energy demand, including not only the power used by the AI chips that run models but also by all the other infrastructure needed to support that hardware. “W