Latest Tech News

Stay updated with the latest in technology, AI, cybersecurity, and more

Filtered by: ces Clear Filter

How AI agents can eliminate waste in your business - and why that's smarter than cutting costs

Hazal Ak / iStock via Getty Images Follow ZDNET: Add us as a preferred source on Google. ZDNET's key takeaways AI agents help identify and remove waste in business. All waste is costly, but not all costs are wasteful. CEOs pursue cost efficiency with AI to protect performance. In an AI-powered economy, business leaders are focused on enhancing the productivity and efficiency of their workforce and operations. To accelerate value creation, while focusing on cost reductions and efficiencie

One-time WordPress competitor TypePad ends its slide into obscurity by shutting down

In the olden days, publishing a site on the Internet required that you figure out hosting and have at least some experience with HTML, CSS, and the other languages that make the Internet work. But the emergence of blogging and "Web 2.0" sites in the late '90s and early 2000s gave rise to a constellation of services that would offer to host all of your thoughts without requiring you to build the website part of your website. Many of those services are still around in some form—someone who really

New iPhone 17 accessory from Apple leaked ahead of event

When leaker Majin Bu showed off clones of alleged TechWoven iPhone 17 case boxes, I noticed the fine print on the box mentioned compatibility with an unannounced accessory called Crossbody Strap. In a new post, Majin Bu has more details about this new iPhone 17 accessory from Apple. iPhone 17 cases will have a new feature iPhone 17 case leaks have surfaced all through August. We’ve learned that Apple will likely include lanyard holes on either side of the bottom of its silicone cases, similar

Standalone AI Devices Are Back, Baby. The Note-Taking Plaud Note 3 Proves It

There was a moment around 18 months ago when it felt like AI had unlocked an entirely new consumer technology category. The wearable Humane Pin and handheld Rabbit R1 were small, standalone devices that promised to be your AI personal assistants and threatened to be smartphone killers. But almost as soon as the hype around them peaked, it died down again. The devices that hit the market during that initial wave of excitement overpromised and underdelivered, and today we remain just as reliant o

Topics: ai devices note plaud pro

Google’s sideloading crackdown could blunt some eReaders’ edge

Rita El Khoury / Android Authority TL;DR Google’s latest app requirement may soon block the sideloading of apps from unregistered developers. The change could impact readers who rely on sideloaded apps on their Android-based eReaders. The new requirement will begin rolling out in September 2026. Google’s latest app requirement claims to protect users, but feels more like a move for greater control. In accordance with the “developer verification requirement,” developers will need to confirm t

Delivery Companies Around the World Stop Shipments to the US: Here's Who's Affected

Primary shipping services, including the European branch of DHL, multiple European state postal services, Australia Post, Japan Post and Taiwan's state postal service, have stopped shipping consumer goods of varying amounts (over $100 in some cases) to the US. The pause is currently expected to be temporary as countries respond to the latest US tariff measures, but could have a significant impact on US businesses selling anything from Taiwanese GPUs and Japanese card packs to European electronic

Apple to secure nearly half of TSMC’s 2nm production (report)

According to the latest rumors, Apple is slated to use TSMC’s 2nm process for its upcoming A20 chip, expected to power the iPhone 18 series. Now, a new report details the chipmaker’s roadmap for bringing the chip into mass production, and the industry-wide rush to secure an early supply. As reported by DigiTimes, citing supply chain sources, TSMC is set to ramp up its 2nm process in the next quarter, and has been charging up to $30,000 per wafer, a record high. Still, demand has never been high

Colombia joins the list of countries probing Apple over App Store antitrust concerns

From the United States to the United Kingdom, from Brazil to Japan, and in many countries in between, Apple has been facing a series of antitrust probes, particularly over its App Store rules. Now, Colombia is also joining in. Here are the details. Last year, Colombia’s Office for Competition Protection launched a probe into Apple’s App Store rules. In its preliminary conclusion, it said that Apple had “employed abusive strategies that were contrary to free commerce.” Now, as reported by Mobil

Chipolo, an AirTag rival, debuts rechargeable trackers with a six-month battery life

Chipolo, the maker of item tracking devices that compete with AirTags, launched its latest additions to its lineup of rechargeable products on Wednesday, including an updated version of its colorful LOOP tracker and the slim Chipolo CARD. The latter is designed to slip into your wallet and features a textured matte surface in an understated charcoal color, making it easy to blend in with other credit cards. Meanwhile, the LOOP can be attached to everyday items — like your keys, purse, or backpa

Google to verify all Android devs to protect users from malware

Google is introducing a new defense for Android called ‘Developer Verification’ to block malware installations from sideloaded apps sourced from outside the official Google Play app store. For apps on Google Play, there was already a requirement for publishers to provide a D-U-N-S (Data Universal Numbering System) number, introduced on August 31, 2023. Google says this has had a notable effect in reducing malware on the platform. However, the system didn’t apply to the vast developer ecosystem

Global Salt Typhoon hacking campaigns linked to Chinese tech firms

The U.S. National Security Agency (NSA), the UK's National Cyber Security Centre (NCSC), and partners from over a dozen countries have linked the Salt Typhoon global hacking campaigns to three China-based technology firms. According to the joint advisories [NSA, NCSC], Sichuan Juxinhe Network Technology Co. Ltd., Beijing Huanyu Tianqiong Information Technology Co., and Sichuan Zhixin Ruijie Network Technology Co. Ltd. have provided cyber products and services to China's Ministry of State Securi

South Korea bans smartphones in all middle and elementary school classrooms

South Korean lawmakers have banned smartphones and other smart devices in elementary and middle school classrooms, The New York Times reports. The law goes into effect in 2026. The legislation only outlaws these devices during class hours and there are no stipulations regarding punishment for violators. The law does, however, give principals and teachers the power to stop students from carrying or using a phone on school grounds. Additionally, students are able to use smart devices during emerg

HSBC apologises as app and online banking go down

HSBC apologises as app and online banking go down HSBC has apologised after customers were left unable to access online banking or use its app in the UK, preventing some from accessing their accounts. Thousands of people have reported problems on outage-checking site Downdetector since the issues first emerged at 11:00 BST on Wednesday. According to HSBC's service status website, customers can still access their accounts by phone and in-person, and card payments are unaffected. "We're really

Healthcare Services Group data breach impacts 624,000 people

The Healthcare Services Group (HSGI) is alerting more than 600,000 individuals that their personal information was exposed in a security breach last year. The healthcare services provider stated that it detected unauthorized access to its network on October 7, 2024, and subsequently discovered that the intrusion had begun on September 27. The investigation that followed revealed that the intruders had exfiltrated data from the systems they had accessed. “The investigation determined that an u

Verily is closing its medical device program as Alphabet shifts more resources to AI

In Brief Alphabet’s life sciences arm Verily laid off staff and eliminated its entire devices program Monday. CEO Stephen Gillett announced the “difficult decision” to wind down the program in a staff memo, according to Business Insider. “Over the years, Verily has built a legacy in developing world-class, innovative medical devices,” Gillett wrote, noting that the “path forward requires difficult decisions” as Verily refocuses on AI and data infrastructure. The move continues Alphabet’s agg

Eyecam

More info about the project, or request for more media? Contact me at [email protected] . You can download the HD pictures ( mirror ) and the HD video (without captions: link ). Interested in building one ? Eyecam is Open-Source ! What is Eyecam? Eye contact. Human eyes are crucial for communication. Through the look, we can perceive happiness, anger, boredom or fatigue. The eyes move around when someone is curious and took straight to maintain focus. We are familiar with these interact

Google to verify all Android devs to block malware on Google Play

Google is introducing a new defense for Android called ‘Developer Verification’ to block malware installations from sideloaded apps sourced from outside the official Google Play app store. For apps on Google Play, there was already a requirement for publishers to provide a D-U-N-S (Data Universal Numbering System) number, introduced on August 31, 2023. Google says this has had a notable effect in reducing malware on the platform. However, the system didn’t apply to the vast developer ecosystem

Salesloft breached to steal OAuth tokens for Salesforce data-theft attacks

Hackers breached sales automation platform Salesloft to steal OAuth and refresh tokens from its Drift chat agent integration with Salesforce to pivot to customer environments and exfiltrate data. The ShinyHunters extortion group claims responsibility for these additional Salesforce attacks. Salesloft's SalesDrift is a third-party platform that connects the Drift AI chat agent with a Salesforce instance, allowing organizations to sync conversations, leads, and support cases into their CRM. Acc

Apple set to unveil next-gen iPhones and other devices on September 9

Apple is hosting its next product event on Tuesday, September 9, at 10 am Pacific and 1 pm Eastern, the company announced today. Though Apple's event announcements rarely indicate what the company plans to talk about, the company's September events for well over a decade have all revolved around the iPhone. The event will be available to stream from YouTube or from Apple's events website. Rumors about this year's iPhones point to a more significant redesign than in recent years, though Apple i

Trump Accuses Other Countries of Making Silicon Valley the ‘Piggy Bank’ of the World

Tariff-obsessed President Donald Trump is threatening to slap even more tariffs and restrictions on chip exports against countries that implement a digital services tax. In a post on Truth Social, Trump said on Monday that these taxes are “designed to harm, or discriminate against, American Technology” while giving a “complete pass to China’s largest Tech Companies.” A digital services tax is a tax on the revenues that large companies, like Google or Meta, earn from providing digital services.

The TTY Demystified (2008)

The TTY subsystem is central to the design of Linux, and UNIX in general. Unfortunately, its importance is often overlooked, and it is difficult to find good introductory articles about it. I believe that a basic understanding of TTYs in Linux is essential for the developer and the advanced user. Beware, though: What you are about to see is not particularly elegant. In fact, the TTY subsystem — while quite functional from a user's point of view — is a twisty little mess of special cases. To und

Apple @ Work Podcast: Device security vs identity management in the enterprise

Apple @ Work is exclusively brought to you by Mosyle, the only Apple Unified Platform. Mosyle is the only solution that integrates in a single professional-grade platform all the solutions necessary to seamlessly and automatically deploy, manage & protect Apple devices at work. Over 45,000 organizations trust Mosyle to make millions of Apple devices work-ready with no effort and at an affordable cost. Request your EXTENDED TRIAL today and understand why Mosyle is everything you need to work with

If 5% of AI projects succeed, then yours can too - and this is how

GarryKillian/iStock/Getty Images Plus via Getty Images Follow ZDNET: Add us as a preferred source on Google. ZDNET's key takeaways Although 95% of AI projects fail, research shows that successful initiatives focus on infrastructure. Top hurdles include poor integration, lack of skill sets, and difficulty building in-house AI solutions. Businesses that successfully implement AI are 85% more likely to have worked with third-party AI providers. When it comes to AI, most people fit in one of

Ask HN: Why hasn't x86 caught up with Apple M series?

Hi, My daily workhorse is a M1 Pro that I purchased on release date, It has been one of the best tech purchases I have made, even now it really deals with anything I throw at it. My daily work load is regularly having a Android emulator, iOS simulator and a number of Dockers containers running simultaneously and I never hear the fans, battery life has taken a bit of a hit but it is still very respectable. I wanted a new personal laptop, and I was debating between a MacBook Air or going for a F

Make the Easy Change Hard

I'd say this is a setup for a joke later on in the blog post, except the joke doesn't even make sense, so I don't really know what this is. Generated by ChatGPT. There’s a semi-well-known adage in software development that says when you have a hard code change, you should “first make the hard change easy, and then make the easy change.” In other words, refactor the code (or do whatever else you need to do) to simplify the change you’re trying to make before trying to make the change. This is es

An illustrated guide to OAuth

OAuth was first introduced in 2007. It was created at Twitter because Twitter wanted a way to allow third-party apps to post tweets on users' behalf. Take a second to imagine designing something like that today. How would you do it? One way would just be to ask the user for their username and password. So you create an unofficial Twitter client, and present the user a login screen that says "log in with Twitter". The user does so, but instead of logging into Twitter, they're actually sending the

Netflix sets opening dates for its destination entertainment hubs

We now have the opening dates for Netflix's branded entertainment complexes that we first learned of in 2023. The 100,000-square-foot amusement centers will be centered around all things Netflix and will include a retail component, a restaurant called Netflix Bites and numerous "immersive story-driven experiences" based on the company's most successful properties. The Netflix House in Philadelphia will open November 12 at the King of Prussia Mall, and the Dallas location will open December 11 a

Defending against malware persistence techniques with Wazuh

Malware persistence techniques enable attackers to maintain access to compromised endpoints despite system reboots, credential changes, or other disruptions. Common methods include altering configurations, injecting startup code, and hijacking legitimate processes. These approaches ensure the malware or attacker remains active, allowing malicious activities to continue without the need for re-exploitation. In this article, we will examine the nature of malware persistence techniques, their imp

An Illustrated Guide to OAuth

OAuth was first introduced in 2007. It was created at Twitter because Twitter wanted a way to allow third-party apps to post tweets on users' behalf. Take a second to imagine designing something like that today. How would you do it? One way would just be to ask the user for their username and password. So you create an unofficial Twitter client, and present the user a login screen that says "log in with Twitter". The user does so, but instead of logging into Twitter, they're actually sending the