Latest Tech News

Stay updated with the latest in technology, AI, cybersecurity, and more

Filtered by: sec Clear Filter

This Linux distro routes all your traffic through the Tor network - and it's my new favorite for privacy

Jack Wallen / Elyse Betters Picaro / ZDNET Privacy has become a keystone for keeping your information safe and preventing third parties from creating consumer profiles that could then be used for targeted marketing... or worse. To that end, there are countless products and services that promise to keep you and your information private. Some work, and some are nothing but snake oil. For me, the best route to privacy goes through Linux and one of the many privacy-focused distributions. Recently

Blink Security Bundle Is 50% Off for Early Prime Day, Includes 7 Cameras and Storage With a MicroSD Card

It’s never been easier or more affordable to keep an eye on your home, both inside and out. Whether you’re heading out of town or just want extra peace of mind while you’re at work, a dependable security camera system can make a world of difference. The problem is, most setups either cost too much up front or require subscriptions to get all the features. And if you’re already paying for the equipment, there’s no way you want to spend more money on a subscription every month, too. Luckily, there

Disabling Intel Graphics Security Mitigation Boosts GPU Compute Performance 20%

While not talked about as much as the Intel CPU security mitigations, Intel graphics security mitigations have added up over time that if disabling Intel graphics security mitigations for their GPU compute stack for OpenCL and Level Zero can yield a 20% performance boost. Ubuntu maker Canonical in cooperation with Intel is preparing to disable these security mitigations in the Ubuntu packages in order to recoup this lost performance.I haven't looked at the Intel graphics security mitigation cost

Show HN: Ariadne – A Rust implementation of aperiodic cryptography

Ariadne Suite ariadne.ciphernomad.org This repository contains the Ariadne Suite, our canonical Rust implementation of the Ariadne Protocol. The protocol is a novel cryptographic architecture we designed around the Labyrinth Construction to provide aperiodic, or non-repeating, cryptographic transformations. The project mission is to create resilient, open-source tools for digital sovereignty. This is independent research, released as a public good. Its continuation, development, and future s

Israel urges citizens to turn off home cameras as Iran hacks surveillance systems

Cutting corners: As tensions between Israel and Iran escalate, Israeli authorities are urging citizens to take an unusual but crucial step: turn off their home security cameras or change their passwords. The warning comes amid growing evidence that Iran is actively attempting to tap into private surveillance devices across Israel to gather intelligence for military operations. In the aftermath of recent Iranian missile strikes on Tel Aviv, concerns about the vulnerability of internet-connected

Debunking NIST's calculation of the Kyber-512 security level (2023)

The cr.yp.to blog 2023.10.03: The inability to count correctly: Debunking NIST's calculation of the Kyber-512 security level. #nist #addition #multiplication #ntru #kyber #fiasco [Sidney Harris cartoon used with permission. Copyright holder: ScienceCartoonsPlus.com.] Quick, what's 240 plus 240? It's 280, right? No, obviously not. 40 plus 40 is 80, and 240 times 240 is 280, but 240 plus 240 is only 241. Take a deep breath and relax. When cryptographers are analyzing the security of cryptogra

This Hidden Trick Can Help Keep Your iPhone's Notes App Organized

Apple announced at its Worldwide Developers Conference on June 9 that the next version of the iPhone's operating system will be called iOS 26. The tech giant said iOS 26 will bring a transparent glass design to icons and menus and much more to your iPhone this fall. But when Apple released iOS 18 in September, the company made it easy to keep your Notes app more organized with collapsible sections. Read more: iOS 18 Brings These New Features to Your iPhone There are other ways to keep Notes or

Topics: 18 ios notes sections tap

Delta Chat is a decentralized and secure messenger app

Delta Chat is a decentralized and secure messenger app 💬 Reliable instant messaging with multi-profile and multi-device support ⚡️ Sign up to secure fast chatmail servers or use classic e-mail servers 🥳 Interactive web apps in chats for gaming and collaboration 🔒 Audited end-to-end encryption safe against network and server attacks 👉 FOSS software, built on Internet Standards, avoiding xkcd927 :) Download Available on mobile and desktop.

Social Security Is Set to Dry Up Even Sooner. That's Why I'm Not Relying on It for Retirement

Getty Images/Zooey Liao/CNET If you're banking on Social Security to fund your retirement, you may want to think twice. A new forecast from the Social Security Administration shows that Social Security trust funds will be depleted by 2034, a year sooner than initially forecast. At this time, you'll only be able to receive 81% of your benefits, reducing the amount you'll get paid. As a personal finance expert who saved enough to retire comfortably at 40, I've worked with dozens of clients to h

Wyze wants to keep prying eyes away from your cameras with this new feature

Wyze Wyze is rolling out a new program to make sure only you can see your home security cameras. In an announcement Tuesday about its new VerifiedView program, Wyze explained that it already uses "strong protections like password requirements, two-factor authentication, cloud security, encryption, tools to detect suspicious logins, and much more." Despite those efforts, though, the company has suffered several high-profile breaches that potentially let people look into strangers' homes. Also:

HCP Vault Secrets End of Life

HashiCorp will be decommissioning HCP Vault Secrets. The team is shifting focus to bringing the ease of use learnings from HCP Vault Secrets to HCP Vault Dedicated. Current HCP Vault Secrets users are encouraged to migrate to HCP Vault Dedicated. Important Timelines End of Sale: June 30, 2025 New customers will no longer have access to HCP Vault Secrets Existing customers will be able to add new HCP Vault Secrets applications until the end of life End of life: August 27, 2025 (pay-as-you-go

Can users reset their own passwords without sacrificing security?

Like it or not, passwords aren’t going away anytime soon. While many organizations are exploring passwordless authentication, passwords still serve as the main line of defense for most public-facing online services. That said, they come with a heavy management burden. Gartner estimates that 40% of all service desk calls are tied to password issues like expirations, changes, and resets. Some of these issues (like forgotten passwords, routine expirations, or security-driven updates) are unavoidab

Microsoft to remove legacy drivers from Windows Update for security boost

Microsoft has announced plans to periodically remove legacy drivers from the Windows Update catalog to mitigate security and compatibility risks. "The rationale behind this initiative is to ensure that we have the optimal set of drivers on Windows Update that cater to a variety of hardware devices across the windows ecosystem, while making sure that Microsoft Windows security posture is not compromised," Microsoft said. "This initiative involves periodic cleanup of drivers from Windows Update,

Show HN: SnapQL – Desktop app to query Postgres with AI

SnapQL cursor for data ⚡️ - explore your postgresql db in seconds demo.mp4 generate schema-aware queries in seconds with AI supports any PostgreSQL database fully local desktop app use your own OpenAI key Build SnapQL locally I will eventually ship some precompiled binaries, but that takes some setup. In the meantime, follow these steps to build a local copy:

Microsoft strengthens Windows 365 Cloud PCs with virtualization-based protection

What just happened? Cloud-based Windows installs are generally more secure than local setups, especially against physical and network attacks targeting endpoint devices. Now, Microsoft is raising the bar further by enhancing security features specifically for Windows 365 Cloud PCs. Microsoft recently announced two security-focused changes to the Windows 365 Cloud PC platform. The subscription-based service will soon disable all user-level file redirections and enable several virtualization-base

Security may not be exciting, but AWS proves it's essential

Editor's take: If I'm being totally honest, it's difficult to get excited about improved security capabilities in the tech world. I know they're incredibly important and absolutely essential to keep everything functional in today's cyberthreat-filled world. But it's kind of like thinking about insurance – not much fun. On top of that, by necessity, security updates need to be released at a rate that's as fast (or even faster) than the latest technological innovations in order to keep bad actors

The secondhand Switch 2 market is already a minefield of bricked consoles

Oliver Cragg / Android Authority TL;DR Reports of bricked secondhand Switch 2 consoles are already coming in. Nintendo has been banning consoles that use MiG Switch carts, with no recourse. This has major implications for the used Switch 2 market going forward. The Nintendo Switch 2 has only been out for a few weeks, but some lucky users have already found deals on secondhand consoles. One Reddit user reported finding such a deal, scoring a sweet $50 discount on the console, even though new

Apple hit with class action suit over App Store crypto scam

You know it’s a day that ends in “y” when there’s a new App Store lawsuit. This time, the issue isn’t antitrust or developer rejection complaints, but rather a class action accusing Apple of facilitating the spread of cryptocurrency scams by allowing a fake trading app onto the App Store. Here’s what happened. Filed this week in the Northern District of California (via CoinGeek), the lawsuit centers around an app called Swiftcrypt, which allegedly posed as a legitimate crypto trading platform b

Special Webinar: Key Insights from Verizon’s 2025 DBIR

The Verizon Data Breach Investigations Report (DBIR) is one of cybersecurity's most authoritative annual reports. The 2025 DBIR highlights critical trends including rising GenAI-related risks, credential theft, and vulnerabilities from third-party partners. LayerX is hosting Alex Pinto, one of the lead authors of the 2025 DBIR for a special webinar to discuss the modern threat landscape and how enterprises should protect themselves. Register directly for the webinar here. Verizon DBIR: Cr

A deep-dive explainer on Ink and Switch's BeeKEM protocol

I’ve spent the last year working on local-first apps, most recently with Muni Town. For me, ‘local-first’ isn’t just a technical architecture — it’s a political and social stance. It’s about shifting control: from remote servers and top-down central authorities deciding how data, workflows, and communities operate, to individuals and communities reclaiming that control and gaining autonomy. Seen this way, privacy and consent aren’t add-ons — they’re foundational, just as critical as sync or data

Topics: group key keys new secret

Ring Alarm 14-Piece Kit Drops to Black Friday Low, Amazon Clears Stock for Non-Prime Members

When it comes to home security devices, certain items aren’t frequently discounted that deeply. The Ring Alarm 14-piece kit is one of the hard-to-find deals, and today it’s priced about as low as Black Friday last year – something we haven’t witnessed since then. What’s making this deal even better is that, unlike with Prime Day, you don’t need a Prime membership in order to take advantage. Anyone can take this deal, and it’s for the 14-piece set only and not smaller sets. Priced at $330, this

Wyze adds major security update to its security cameras after numerous security lapses

Wyze, the Seattle-based tech company that specializes in smart home products and wireless cameras, has released a major security update that it hopes will rebuild some lost trust. The company has been plagued by numerous security failures over the past few years, most notably when an AWS outage led to thousands of users gaining access to recorded videos from other people’s homes. That incident, paired with the company’s history of lackluster responses to security flaws, even led The New York Tim

This Huge 18.5-Inch FHD Portable Monitor Is 40% Off, Amazon Clearing Stock at Record Low

There’s nothing quite as frustrating as trying to work or multitask on a cramped laptop screen. Whether you’re crunching numbers in Excel, editing photos, or just want to stream a video while keeping an eye on your inbox, a second screen can make all the difference. And not just any second screen: this 18.5-inch portable monitor on sale at Amazon is a true game-changer. Whereas the majority of portable monitors top out at about 15 inches, this one comes in an XXL format that is notable for its

Microsoft 365 to block file access via legacy auth protocols by default

Microsoft has announced that it will start updating security defaults for all Microsoft 365 tenants in July to block access to SharePoint, OneDrive, and Office files via legacy authentication protocols. These changes will also address application access permissions that can expose organizations to unnecessary security risks. The rollout is set to begin in mid-July 2025, with an estimated completion date by August 2025. Microsoft will enable them by default for all Microsoft 365 tenants, across

ChainLink Phishing: How Trusted Domains Become Threat Vectors

Phishing remains one of cybersecurity’s most enduring threats, not because defenders aren’t evolving, but because attackers are adapting even faster. Today’s most effective campaigns aren’t just built on spoofed emails or shady domains. They exploit something far more insidious: trust in the tools and services we use every day, leading to zero-hour phishing. The Rise of ChainLink Phishing Traditional phishing relied on easily identifiable red flags such as suspicious senders and questionable

Blink’s Newest Outdoor Smart Security Cam (3-Pack) Is Now 62% Off, Practically Free Per Unit

Upgrading your home security system doesn’t have to mean a complicated installation or a subscription you’ll forget about in six months. If you’ve been trying to figure out a way to keep tabs on your front porch, backyard, or garage without spending a fortune, you should consider what Amazon has on offer by way of its security cameras. We’ve found a fantastic deal that you won’t want to skip out on right now, in fact. See at Amazon Right now, you can check Amazon to get a 3-pack of the Blink O

AVG Antivirus Review 2025: Robust Free Version but Middling Premium Plans

CNET’s expert staff reviews and rates dozens of new products and services each month, building on more than a quarter century of expertise. 7.6 / 10 SCORE AVG Antivirus Buy at AVG Score Breakdown Performance 9 /10 Security 7 /10 Customer Support 7 /10 Usability 9 /10 Value 7 /10 Features 7 /10 Pros Robust protection from both online and offline threats Resource-light scans TuneUp makes it easy to improve device performance Variety of safe browsing and anti-tracking tools Cons Data sharing w

Wyze tell us why its security cameras deserve your trust again

In an effort to restore trust in the security of its cameras, smart home brand Wyze has developed VerifiedView — a new layer of protection that embeds your user ID into the metadata of every photo, video, and livestream. Wyze claims the system matches this data to your account before playback, blocking unauthorized access to your footage. “This is a safety net,” Wyze co-founder and CMO Dave Crosby tells The Verge. “On top of doing everything we can to protect users, we’ve built this double chec

Wyze Announces a Major Security Revamp with New Metadata Tricks for Security Cameras

CNET reviewers have been fans of Wyze's security platform and cameras in the past, but in the last couple of years I've pulled back from recommending their affordable cams and similar security devices due to a series of unsettling security breaches that I covered in-depth. Now it's been well over a year, and Wyze's security changes have culminated in a fascinating new safety layer called VerifiedView. Wyze VerifiedView basics Wyze video, photo and streaming content from cams is getting a serio

Wyze says its security cameras deserve your trust again

In an effort to restore trust in the security of its cameras, smart home brand Wyze has developed VerifiedView — a new layer of protection that embeds your user ID into the metadata of every photo, video, and livestream. Wyze claims the system matches this data to your account before playback, blocking unauthorized access to your footage. “This is a safety net,” Wyze co-founder and CMO Dave Crosby tells The Verge. “On top of doing everything we can to protect users, we’ve built this double chec