Latest Tech News

Stay updated with the latest in technology, AI, cybersecurity, and more

Filtered by: dat Clear Filter

I tested a subscription-free smart ring that rivals Oura - and it's $50 off for Prime Day

ZDNET's key takeaways The Ultrahuman Ring Air is the brand's first foray into the smart ring space, and it's available for $349, no subscription required The ring is great for hardcore fitness enthusiasts and recreational exercisers looking to use their health data to optimize their wellness routines The app's user interface could be improved for easier access to daily logging functions. $349 at Amazon For Amazon Prime Day, the retailer is offering the Ultrahuman Ring Air at a $50 discount, b

Qantas confirms data breach impacts 5.7 million customers

Australian airline Qantas has confirmed that 5.7 million people have been impacted by a recent data breach, in which threat actors stole customers' data. On July 1st, Qantas disclosed that it had detected a cyberattack the previous day on a third-party platform used by a Qantas airline contact centre. While the company did not share any further details, BleepingComputer learned that the attack shared similarities with other attacks on the aviation industry linked to threat actors classified as

Microsoft confirms Windows Server Update Services (WSUS) sync is broken

Microsoft has confirmed a widespread issue in Windows Server Update Services (WSUS) that prevents organizations from syncing with Microsoft Update and deploying the latest Windows updates. Windows Server Update Services (WSUS) is a Microsoft product that allows businesses to manage and distribute Windows updates to computers within their network. By default, WSUS synchronizes with Microsoft Update servers once a day, when it downloads the latest metadata on available Windows updates. Admins ca

Even ‘Foundation’ Star Jared Harris Can’t Explain That Big Hari Seldon Mystery

Foundation returns to Apple TV+ this week, jumping ahead 152 years and plunging its characters into an end-of-the-world scenario. One of the key figures is Hari Seldon, played by Jared Harris. He created the Foundation in season one as a way to preserve civilization after his “psychohistory” predicted a coming age of darkness. In the wild drama that’s followed, we’ve seen Hari die and then resurrect as separate digital clones, one of which ended up getting a new human body in season two. It’s c

A New Kind of AI Model Lets Data Owners Take Control

A new kind of large language model, developed by researchers at the Allen Institute for AI (Ai2), makes it possible to control how training data is used even after a model has been built. The new model, called FlexOlmo, could challenge the current industry paradigm of big artificial intelligence companies slurping up data from the web, books, and other sources—often with little regard for ownership—and then owning the resulting models entirely. Once data is baked into an AI model today, extract

Bitcoin Depot breach exposes data of nearly 27,000 crypto users

Bitcoin Depot, an operator of Bitcoin ATMs, is notifying customers of a data breach incident that has exposed their sensitive information. In the letter sent to affected individuals, the company informs that it first detected suspicious activity on its network last year on June 23. Although the internal investigation was completed on July 18, 2024, a parallel investigation by federal agencies dictated that public disclosure of the incident should be withheld until it was completed. “On July 1

YouTube prepares crackdown on ‘mass-produced’ and ‘repetitive’ videos, as concern over AI slop grows

YouTube is preparing to update its policies to crack down on creators’ ability to generate revenue from “inauthentic” content, including mass-produced videos and other types of repetitive content — things that have become easier to generate with the help of AI technology. On July 15, the company will update its YouTube Partner Program (YPP) Monetization policies with more detailed guidelines around what type of content can earn creators money and what cannot. The exact policy language itself h

Samsung just gave its Galaxy foldable phones a big security upgrade - for free

Kerry Wan/ZDNET Alongside the release of its latest foldables, the Galaxy Z Flip 7 and Galaxy Z Fold 7, tech giant Samsung also announced a slew of new AI features for its devices at Samsung Unpacked. While the new features make it easy to access AI assistance, they also highlight the need for enhanced security -- and Samsung, with its latest Knox update, has stepped up to the plate. Also: The best VPN services (and how to choose the right one for you) Tech companies tend to prefer on-device

Looking for an External Hard Drive? This Seagate 24TB Is Just $0.01/GB for Prime Day

Among the vicious competition in the market for external hard drives, four of the largest players – Seagate, WD, SanDisk, and Samsung – are in a constant fight for your attention. Seagate just came today with an incredible 24TB external hard drive on sale at a new record low price: Selling for just $259 (down from $329), Seagate’s Expansion 24TB HDD set a new record low price per gigabyte of about $0.01, which lower than all other drives (including ones with smaller capacities). See at Amazon

Qantas Contacted by Hackers Responsible for Data Breach Affecting Millions of Customers

Qantas disclosed a cybersecurity incident on July 2 potentially affecting 6 million customers. Ryan Fletcher/Getty Images Qantas has been contacted by a cyber criminal claiming responsibility for the data breach that affected 6 million customers. A company spokesperson confirmed Qantas is working to validate this, adding that since it's a criminal matter, the company "won't be commenting any further on the detail of the contact." There's also no evidence that any of the stolen information has

iMerit believes better-quality data, not more data, is the future of AI

AI data platform iMerit believes the next step toward integrating AI tools at the enterprise level is not more data, but better data. And better data doesn’t come from hordes of gig workers, but from experts across mathematics, medicine, healthcare, finance, autonomy, and other cognitive fields, the company says. “What’s become exceedingly important is the ability to attract and retain the best cognitive experts, because we have to take these large models and make them very customized towards s

New ServiceNow flaw lets attackers enumerate restricted data

A new vulnerability in ServiceNow, dubbed Count(er) Strike, allows low-privileged users to extract sensitive data from tables to which they should not have access. ServiceNow is a cloud-based platform that enables organizations to manage digital workflows for their enterprise operations. It is widely adopted across various industries, including public sector organizations, healthcare, financial institutions, and large enterprises. The flaw was discovered by Varonis Threat Labs in February 2025

The biggest AI feature announced at Samsung Unpacked was also the most subtle

Sabrina Ortiz/ZDNET Alongside the release of its latest foldables, the Galaxy Z Flip 7 and Galaxy Z Fold 7, tech giant Samsung also announced a slew of new AI features for its devices at Samsung Unpacked. While the new features make it easy to access AI assistance, they also highlight the need for enhanced security -- and Samsung, with its latest Knox update, has stepped up to the plate. Also: The best VPN services (and how to choose the right one for you) Tech companies tend to prefer on-dev

Exclusive: macOS 26 beta hints at sealed Mac updates at Apple Stores

In recent years, Apple developed a system codenamed Presto, which updates sealed iPhones wirelessly. This way, customers can unbox their new devices that are already running the latest version of iOS, no matter how long they’ve been sitting in stock. Now, the company is working on something similar for the Mac. Presto, but for the Mac With the release of macOS Tahoe 26 beta 3 this week, Apple has started laying the groundwork for a sealed-device update system on the Mac side, mirroring the Pr

Using MPC for Anonymous and Private DNA Analysis

Earlier this year, Monadic DNA kicked off an experiment to demonstrate that people can access and analyze their genetic data with anonymity and privacy. Monadic DNA collected saliva samples from thirty encrypted genomics pioneers at an event in Denver. These participants later used a Web app to claim their genotyping results using a unique kit ID and a self-selected PIN. The app guided users through uploading their data to encrypted storage powered by Nillion’s multi-party compute (MPC) techno

This new setting in Android ensures core Google services are always up to date

Rita El Khoury / Android Authority TL;DR Google is adding a new dashboard to streamline updates of crucial background services on Android. It’s called “System services” and can be found on your Android device’s Privacy & Security settings. The System services dashboard lets you manage existing services or install new ones. Alongside the core Android firmware on your phone, Google adds a layer of additional services responsible for enabling various features on your device, strengthening its s

The Capacity, Performance, and Reliability of MicroSD Cards

Or: What are the best microSD cards you can get for under $15 in 2024 2025? Before you get in: Support me on Patreon! If you just want to see my (current) top picks, click here. If you want to see details on the cards I’m testing, click here. If you want to see the table with my raw data, click here. If you want to see more ways you can help, click here. If you want to read in more detail about the background behind this project and my methodology, read on! Table of Contents Introductio

SUSE launches new European digital sovereignty service to meet surging demand

Thomas Fuller/SOPA Images/LightRocket via Getty Images Wary of the US government and tech companies, the European Union (EU) has seen a surge in support for open source and Linux. In the last few months, local EU governments, including the city of Lyon in France, the German state of Schleswig-Holstein, and Denmark, have begun their move to Linux and open-source software from Microsoft Windows and Office. Now, Luxembourg-based European open-source powerhouse SUSE is offering extensive support to

Pixels are having lock screen issues after Android 16 update (Update: Fix out now)

Joe Maring / Android Authority TL;DR Some Google Pixel owners are reporting lock screen issues after updating to Android 16. Problems include tap-to-wake not working, the screen not turning on after hitting the power button, and more. Google has released a fix for the issue after the publication of this article. Update: July 9, 2025 (1:55 AM ET): There’s good news if you were desperately waiting for Google to address this lock screen issue on Pixels. The company has confirmed that a fix is n

Comparing the Climate and Productivity Impacts of a Shrinking Population

All authors are affiliates of the Population Wellbeing Initiative at UT Austin. This paper subsumes the working paper “Population Decline: Too Small and Too Slow to Influence Climate Change” by the same authors. We thank Jared Bernstein, Maya Eden, Frank Errickson, Jim Feyrer, Chad Jones, Peter Kruse-Andersen, Kyle Meng, Marta Prato, John Podesta, Noah Scovronick, Robert Socolow, Phil Trammell, Sam Trejo, David Weil, Anson Zhou, Stéphane Zuber, Valeria Zurla and participants at the NBER’s confer

Choosing a Database Schema for Polymorphic Data (2024)

Designing a schema for your relational database is a daunting task that has long term implications for the database's performance, maintainability, and correctness. And it often requires making decisions before having a clear picture of the exact shape and distribution of your data, or what the common access patterns will look like. It's not a permanent decision: tables can be altered and databases migrated. But these migrations can be slow and expensive. To top it all off, some data is less am

Libpostal: C library for parsing/normalizing street addresses around the world

libpostal: international street address NLP libpostal is a C library for parsing/normalizing street addresses around the world using statistical NLP and open data. The goal of this project is to understand location-based strings in every language, everywhere. For a more comprehensive overview of the research behind libpostal, be sure to check out the (lengthy) introductory blog posts: 🇧🇷 🇫🇮 🇳🇬 🇯🇵 🇽🇰 🇧🇩 🇵🇱 🇻🇳 🇧🇪 🇲🇦 🇺🇦 🇯🇲 🇷🇺 🇮🇳 🇱🇻 🇧🇴 🇩🇪 🇸🇳 🇦🇲 🇰🇷 🇳🇴 🇲🇽 🇨🇿 🇹🇷 🇪🇸 🇸🇸 🇪🇪 🇧🇭 🇳🇱 🇨🇳 🇵🇹 🇵🇷 🇬🇧 🇵🇸 Address

Google releases July’s Pixel software update with bad news for the Pixel 6a

Rita El Khoury / Android Authority TL;DR Google is rolling out the July 2025 software update for all supported Pixel devices. Eligible devices include the Pixel 6a, 7, 7 Pro, 7a, Tablet, Fold, 8, 8 Pro, 8a, 9, 9 Pro, 9 Pro XL, 9 Pro Fold, and 9a. Along with the security patch, this update starts the Pixel 6a’s Battery Performance Program. It’s July and a new software update is waiting for your Pixel phone. This month’s update, unfortunately, comes with some bad news if you own a Pixel 6a. G

Samsung announces major security enhancements coming to One UI 8

Samsung has announced multiple data security and privacy enhancements for its upcoming Galaxy smartphones running One UI 8, its custom user interface on top of Android. Key highlights include the introduction of a system-level architecture named Knox Enhanced Encrypted Protection (KEEP), upgrades to Knox Matrix, and the addition of quantum resistance to WiFi connectivity. Keeping AI data secure With AI tools taking an increasing role in day-to-day smartphone use, protecting user inputs has be

Supabase MCP can leak your entire SQL database

Model Context Protocol (MCP) has emerged as a standard way for LLMs to interact with external tools. While this unlocks new capabilities, it also introduces new risk surfaces. In this post, we show how an attacker can exploit Supabase’s MCP integration to leak a developer’s private SQL tables. The Problem LLMs are often used to process data according to pre-defined instructions. The system prompt, user instructions, and the data context is provided to the LLM as text. [ SYSTEM PROMPT ] You ar

The Tradeoffs of SSMs and Transformers

This blog post was adapted from a talk I’ve given a handful of times over the last year. It was meant to be a high-level talk accessible to a fairly broad audience, but hopefully has some interesting insights, opinions, and intuitions around sequence models for the dedicated researchers too. State Space Models Just so we’re on the same page, I’ll start by defining what I mean by a state space model. (This section isn’t strictly necessary to get to the main part of this post though; feel free t

I tested the 4 most popular health trackers for a year - and they're on sale for Prime Day

The Oura Ring is, in my opinion, the sleep and health tracker to rule them all. Not only does it track your sleep, stress, activity, and more, it also creates helpful data illustrations that encourages healthy habits, whether that's a consistent bedtime routine, daily activity, or reduced alcohol consumption. Many users, myself included, have reported changing their drinking habits after seeing their heart rate's response to a few beers late at night on Oura's graphs. Earning high sleep scores

LLM-Ready Training Dataset for Apple's Foundation Models (iOS 26)

The only comprehensive training dataset for Apple's Foundation Models Framework (iOS 26) What You Get Three technical specification files for training LLMs on Apple's Foundation Models framework: 1. Core Framework Guide SystemLanguageModel availability, LanguageModelSession management, response generation, and context handling. 2. Advanced Implementation Guide @Generable/@Guide macros, constrained decoding, Tool protocol, and performance optimization. 3. Strategic Features Guide Adapter

Supabase MCP leaks your entire SQL Database, a lethal trifecta attack

Supabase MCP can leak your entire SQL database (via) Here's yet another example of a lethal trifecta attack, where an LLM system combines access to private data, exposure to potentially malicious instructions and a mechanism to communicate data back out to an attacker. In this case, General Analysis identify all three components in a single MCP - the Supabase MCP. They imagine a scenario where a developer asks Cursor, running the Supabase MCP, to "use cursor’s agent to list the latest support

Windows 10 KB5062554 cumulative update released with 13 changes, fixes

Microsoft has released the KB5062554 cumulative update for Windows 10 22H2 and Windows 10 21H2, with thirteen new fixes or changes. The Windows 10 KB5062554 update is mandatory as it contains Microsoft's July 2025 Patch Tuesday security updates, which fix one zero-day vulnerability and 136 other flaws. Windows users can install this update by going into Settings, clicking on Windows Update, and manually performing a 'Check for Updates.' However, as this update is mandatory, it will automatica