Latest Tech News

Stay updated with the latest in technology, AI, cybersecurity, and more

Filtered by: sec Clear Filter

Best Home Security Cameras of 2025: My Picks for Your Protection

CNET has tested tons of home security cameras over the years, and can help you find the right one for your needs. Chris Monroe/CNET There are hundreds of home security cameras on the market, ranging drastically in price, functionality and quality. With all the options, it can be hard to not become overwhelmed fast, especially when you're considering something as important as your home's safety. After CNET's years of testing home security cameras, I have some tips if you're on the hunt for a new

Cybersecurity takes a big hit in new Trump executive order

Cybersecurity practitioners are voicing concerns over a recent executive order issued by the White House that guts requirements for: securing software the government uses, punishing people who compromise sensitive networks, preparing new encryption schemes that will withstand attacks from quantum computers, and other existing controls. The executive order (EO), issued on June 6, reverses several key cybersecurity orders put in place by President Joe Biden, some as recently as a few days before

Amazon Has No Margin Left on this Wireless Blink Camera, Now 60% Off Just Like Black Friday

Smart technology has made it easier than ever to keep an eye on your property whether you’re at home or away. One of the top names in this field is Blink, a company that belongs to… Amazon itself. The brand is known for its user-friendly wireless cameras and what’s truly impressive is how Amazon sometimes slashes prices so dramatically that it leaves little or no margin for itself. This happens during big sales events like Prime Day or Black Friday, but right now, you can also take advantage of

Prepare to bid farewell to The Sandman with S2 trailer

The second and final season of The Sandman comes to Netflix next month. Netflix's The Sandman, an exquisite and largely faithful adaptation of Neil Gaiman's beloved graphic novel series, proved to be a hit for the streaming giant, racking up nearly 400 million viewing hours between its release on August 5 and September 18, 2022. Yet there was initially some question about whether even those numbers were strong enough to justify a second season of the critically acclaimed series, which cost a bu

Former NASA Agent Suggests Government Used UFO Theories To Cover "Stealth Technology"

A former NASA official says he thinks the government uses rumors of alien conspiracies to hide its secrets — a suggestion corroborated by a recent bombshell report about military officials spreading UFO disinformation. In an interview with Fox News, Joseph Gutheinz, a former special agent at NASA's inspector general, said that the US military's clandestine operations are likely behind many UFO conspiracy theories. "I believe early on in the 1940s when all these UFO stories started coming up, i

1Password and AWS join forces to secure AI, cloud environments for the enterprise

Join the event trusted by enterprise leaders for nearly two decades. VB Transform brings together the people building real enterprise AI strategy. Learn more 1Password, the Canadian password management company, announced Monday a strategic collaboration agreement with Amazon Web Services that puts the firm in position to capitalize on surging enterprise demand for security tools designed for artificial intelligence and cloud-native environments. The partnership is a major milestone for 1Passwo

New Anubis ransomware can encrypt and destroy data, making file recovery impossible

WTF?! Being affected by a dangerous ransomware operation is bad enough, but at least you might have a chance to recover your files somehow. A recently discovered ransomware strain is making things even trickier by offering a new wiping option that allows affiliate criminals to completely destroy data after encryption. Security researchers have discovered a new Ransomware-as-a-Service campaign with highly destructive potential. Anubis has only been around for a few months and fortunately, hasn't

Norton Antivirus Review 2025: Solid Value for Fast, Effective Protection

CNET’s expert staff reviews and rates dozens of new products and services each month, building on more than a quarter century of expertise. 8.6 / 10 SCORE Norton Antivirus Buy at Norton Pros Resource-light Fast scans Performance optimization tools Superior VPN Cons No identity theft insurance No online account management/data visualization tools AI-heavy customer support Mediocre phone support Founded in 1982, Norton is one of the oldest digital security companies on the planet, and it’

This Tiny Solar Security 2K Camera Is Now 50% Off, Amazon Is Cutting All Margins to Keep You Safe

Outdoor security cameras can feel like more trouble than they’re worth at times – running wires together, with battery packs that take forever to charge, wrestling with terrible video quality and with monthly subscription fees that shoot up fast. But today, Amazon’s offering a solution that trims all those problems on its head and it’s priced nearly too low to believe: The Eufy Security Cam (S220) is a wireless outdoor security camera with solar power and it is currently discounted by 50%, brin

The WIRED Guide to Protecting Yourself From Government Surveillance

The Trump administration has ordered Immigration and Customs Enforcement agents to carry out sweeping raids, deporting thousands of immigrants, often without due process. It has targeted left-leaning foreign students and entire universities, canceling visas and threatening to withhold federal funding. United States Supreme Court appointments from the previous Trump administration have resulted in decisions that enabled roughly half of US states to severely restrict or ban abortions. And Trump’s

Over 46,000 Grafana instances exposed to account takeover bug

More than 46,000 internet-facing Grafana instances remain unpatched and exposed to a client-side open redirect vulnerability that allows executing a malicious plugin and account takeover. The flaw is tracked as CVE-2025-4123 and impacts multiple versions of the open-source platform used for monitoring and visualizing infrastructure and application metrics. The vulnerability was discovered by bug bounty hunter Alvaro Balada and was addressed in security updates that Grafana Labs released on May

Best Cheap Home Security Systems for 2025: I Found the Real Deals

SwitchBot Not sure how to make up your mind? Here are the most important factors when considering a home security system that will spare your wallet. Pricing and subscriptions Security systems can be opaque when it comes to final pricing. The listed cost is often replaced by constant, rotating discounts which are more representative of the actual cost, and total subscription fees may not be obvious. For our list, we chose DIY companies with upfront pricing models so you can see what you get,

Ruby on Rails Audit Complete

The Open Source Technology Improvement Fund is proud to share the results of our security audit of Ruby on Rails. Ruby on Rails (or “Rails”) is an open source full stack web-application framework. Thanks to the help of X41 D-Sec, GitLab, and the Sovereign Tech Agency, Rails can provide more secure versions of the tools needed for users to create database-backed web applications following the Model-View-Controller pattern. Audit Process: The audit work for this engagement took place over Decemb

Infineon security microcontroller flaw enabled extraction of TPM secret keys

A few months ago, security researcher Thomas Roche presented his fundamental research on secure elements used in the YubiKey 5. The security element is the Infineon SLE78, which contains a proprietary implementation of the Elliptic Curve Digital Signature Algorithm (ECDSA). Using side-channel attacks and a great deal of smart research, the author discovered a vulnerability in Infineon Technologies' cryptographic library and, as a result, was able to extract the ECDSA secret key from the secure

Fixing the mechanics of my bullet chess

I’ve been playing chess a long time now, and I’ve always been a good deal better (maybe a couple hundred ELO points) at blitz (3+0 or 5+0) than bullet (1+0). Well, I may have just fixed that. I changed how I move pieces this afternoon and have gained about 100 ELO already. When I play on a computer, I usually drag-and-drop pieces. But it turns out you can also move pieces by clicking first on your piece and then the target square. An analysis of my recent games indicates this shift saved me abou

Peeling the Covers Off Germany's Exascale "Jupiter" Supercomputer

The newest of the exascale-class supercomputer to be profiled in the Top500 rankings in the June list is the long-awaited “Jupiter” system at Forschungszentrum Jülich facility in Germany. We finally have a sense of how this hybrid CPU-GPU machine will perform, although some of the details on its configuration are still not nailed down publicly. Jupiter is the first exascale system to be completed under the EuroHPC Joint Undertaking of the European Union, and the fact that it is not using a cust

Topics: gb gpu grace jupiter sec

So... You Want to Become a Penetration Tester?

Cybersecurity is a rapidly growing and evolving field with a wide range of subfields and specializations. One of these is penetration testing, a discipline within what's known as "red teaming," which seeks to actively find and exploit vulnerabilities within computer systems (with permission, of course). It's an exciting and rewarding career, and I'll show you how to become a penetration tester. Before I continue, however, let me be transparent about my own experience. While I have about three

So... You Want to Become a Penetration Tester?

Cybersecurity is a rapidly growing and evolving field with a wide range of subfields and specializations. One of these is penetration testing, a discipline within what's known as "red teaming," which seeks to actively find and exploit vulnerabilities within computer systems (with permission, of course). It's an exciting and rewarding career, and I'll show you how to become a penetration tester. Before I continue, however, let me be transparent about my own experience. While I have about three

The Tech Job Meltdown

He wrote me a prescription; he said “You are depressed I'm glad you came to see me to get this off your chest Come back and see me later, next patient please Send in another victim of industrial disease” Industrial Disease, Dire Straits The Google campus doesn’t look as friendly as it used to. (this ia actually from Bartertown in Mad Max 3 - you can see Thunderdome in the middle) Since the start of 2023, more than half-a-million tech workers have been laid off. This isn’t the impact of COV

Red team AI now to build safer, smarter models tomorrow

Join the event trusted by enterprise leaders for nearly two decades. VB Transform brings together the people building real enterprise AI strategy. Learn more Editor’s note: Louis will lead an editorial roundtable on this topic at VB Transform this month. Register today. AI models are under siege. With 77% of enterprises already hit by adversarial model attacks and 41% of those attacks exploiting prompt injections and data poisoning, attackers’ tradecraft is outpacing existing cyber defenses.

Victoria’s Secret restores critical systems after cyberattack

Victoria's Secret has restored all critical systems impacted by a May 24 security incident that forced it to shut down corporate systems and the e-commerce website. The company operates around 1,380 retail stores in nearly 70 countries and has reported net sales of $1.353 billion for the first quarter of 2025, with a forecasted net sales range of up to $6.3 billion for the year. In a Thursday filing with the U.S. Securities and Exchange Commission, the company disclosed that all restored criti

Frequent reauth doesn't make you more secure

Frequent reauth doesn't make you more secure You're happily working away, fingers flying, deep in flow, and suddenly, boink, your session has expired. You sigh, re-enter your password (again), complete an MFA challenge (again), maybe approve an email notification (again), and finally — access restored. Until next time. This wasn't so bad when it was just passwords; we all got pretty fast at retyping our passwords. But all those MFA challenges really slow us down. And MFA fatigue attacks, a gro

Microsoft fixes first known zero-click attack on an AI agent

TL;DR: Microsoft has patched a critical zero-click vulnerability in Copilot that allowed remote attackers to automatically exfiltrate sensitive user data simply by sending an email. Dubbed "EchoLeak," the security flaw is being described by cybersecurity researchers as the first known zero-click attack targeting an AI assistant. EchoLeak affected Microsoft 365 Copilot, the AI assistant integrated across several Office applications, including Word, Excel, Outlook, PowerPoint, and Teams. Accordin

Can You Legally Record Audio or Video on Your Security Camera? I Focus on These Rules

If you're thinking about installing a new security camera in your home, a legal question appears: Is it legal for you to record audio and video anywhere you want in your home? Are there limitations or the possibility of lawsuits from your neighbors? This is something I've thought about a lot as I've tested security cameras in all parts of my home for years. Owners must know when and where it's legal to record everything from their front yard and streets to friends, babysitters, and pet sitters.

Conveyor uses AI to automate the painful process of vendor security reviews and RFPs with AI

Selling software to companies is such a time-consuming process. Even after customers are convinced a product is right for their organization, they still need to ensure the software meets all their security requirements. Chas Ballew realized just how painfully slow and tedious the vendor security and compliance review process was when he was running Aptible, a hosting platform for healthcare companies that he co-founded in 2013. “What we saw was that every time one of our customers was trying to

Two exploits are threatening Secure Boot, but Microsoft is only patching one of them

Facepalm: Microsoft and the PC industry developed the Secure Boot protocol to prevent modern UEFI-based computers from being hacked or compromised during the boot process. However, just a few years later, the technology is plagued by a steady stream of serious security vulnerabilities. Cybercriminals are currently having a field day with Secure Boot. Security experts have uncovered two separate vulnerabilities that are already being exploited in the wild to bypass SB's protections. Even more co

Microsoft Edge now offers secure password deployment for businesses

Microsoft announced that a new Edge feature allowing employees to share passwords more securely in enterprise environments has reached general availability. Known as secure password deployment, this feature will be available to Microsoft Edge for Business users starting this week, minimizing the risk of unauthorized access by ensuring that employees don't accidentally share passwords with unintended recipients. The feature is available for Microsoft 365 Business Premium, E3, and E5 subscriptio

Security Service Edge(SSE): Powering the Modern Hybrid Workplace

The way we work has fundamentally shifted. Hybrid models, where employees split their time between the office and remote locations, are no longer a niche trend but a widespread reality. This evolution offers numerous benefits, including increased flexibility and improved work-life balance. However, it also presents significant challenges for IT and security teams tasked with ensuring seamless access to applications and protecting sensitive data outside the traditional corporate perimeter. Securi

Think before you click: Experts warn email "Unsubscribe" links pose security risks

In a nutshell: A common rule of thumb advises unsubscribing from commercial emails if they are annoying or outright spam. However, some experts caution against this advice, as clicking the "unsubscribe" button can expose users to additional risks and security issues. According to TK Keanini, CTO at DNSFilter, the "click to unsubscribe" option found at the bottom of many commercial emails can become a security risk over time. Users often click these links blindly in an attempt to stop the flood

‘Generative AI helps us bend time’: CrowdStrike, Nvidia embed real-time LLM defense, changing how enterprises secure AI

Join the event trusted by enterprise leaders for nearly two decades. VB Transform brings together the people building real enterprise AI strategy. Learn more Generative AI adoption has surged by 187% over the past two years. But at the same time, enterprise security investments focused specifically on AI risks have grown by only 43%, creating a significant gap in preparedness as AI attack surfaces rapidly expand. More than 70% of enterprises experienced at least one AI-related breach in the pa