Latest Tech News

Stay updated with the latest in technology, AI, cybersecurity, and more

Filtered by: security Clear Filter

Encryption Made for Police and Military Radios May Be Easily Cracked

Two years ago, researchers in the Netherlands discovered an intentional backdoor in an encryption algorithm baked into radios used by critical infrastructure–as well as police, intelligence agencies, and military forces around the world–that made any communication secured with the algorithm vulnerable to eavesdropping. When the researchers publicly disclosed the issue in 2023, the European Telecommunications Standards Institute (ETSI), which developed the algorithm, advised anyone using it for

Computing’s Top 30: Guowen Xu

Guowen Xu’s passion for cryptography was seeded in various courses throughout his undergraduate mathematics education. It was his experience as a doctoral student, however, that was truly transformative in terms of his learning how to navigate cryptographic security’s complexities and begin shaping his research directions and career. Today, Xu is a full professor in the School of Computer Science and Engineering at the University of Electronic Science and Technology of China, Chengdu. Xu’s wor

There's a Tea app for men, and it also has security problems

Tea bills itself as a safety dating app for women, allowing users to anonymously share details about men they have met. A new app called TeaOnHer has emerged that attempts to flip the script, with men sharing information about women they date. And while Tea drew scrutiny last month after a data breach revealed user information, including potentially identifying details such as phone numbers and personal anecdotes, the copycat app seems to be suffering from the same problem. TechCrunch discovere

Researchers hacked Google Gemini to take control of a smart home

Wired reported on new cybersecurity research that demonstrated a hack of the Google Gemini artificial intelligence assistant. The researchers were able to control connected smart home devices through the use of indirect prompt injections in Google Calendar invites. When a user requested a summary of their calendar and thanked Gemini for the results, the malicious prompt ordered Google's Home AI agent to take actions such as opening windows or turning lights off, as demonstrated in the video abov

Anthropic ships automated security reviews for Claude Code as AI-generated vulnerabilities surge

Want smarter insights in your inbox? Sign up for our weekly newsletters to get only what matters to enterprise AI, data, and security leaders. Subscribe Now Anthropic launched automated security review capabilities for its Claude Code platform on Wednesday, introducing tools that can scan code for vulnerabilities and suggest fixes as artificial intelligence dramatically accelerates software development across the industry. The new features arrive as companies increasingly rely on AI to write c

Claude Code makes it easy to trigger a code check now with this simple command

Anthropic / Elyse Betters Picaro / ZDNET ZDNET's key takeaways Automated security reviews in Claude Code help ensure code safety. Spot and fix vulnerabilities before your code reaches production. Run the /security-review command in the terminal or via GitHub Action. Claude Code became generally available in May, and since then, it has become popular among developers for its coding assistance, available right in the terminal or integrated development environments (IDEs). Now, new features ar

Citizen Lab director warns cyber industry about US authoritarian descent

The director of Citizen Lab, one of the most prominent organizations investigating government spyware abuses, is sounding the alarm to the cybersecurity community and asking them to step up and join the fight against authoritarianism. On Wednesday, Ron Deibert will deliver a keynote at the Black Hat cybersecurity conference in Las Vegas, one of the largest gatherings of information security professionals of the year. Ahead of his talk, Deibert told TechCrunch that he plans to speak about what

Firefox Focus won me over in just 10 mins - why it's my new default mobile browser

Jack Wallen / Elyse Betters Picaro / ZDNET ZDNET's key takeaways Firefox Focus is a security and privacy-focused mobile browser. This browser offers a minimal UI and maximum privacy features. Firefox Focus is available for both Android and iOS. I've run the gamut of web browsers on Android, and every time I think I've found "the one," I discover a reason not to use it. That reason might be a cluttered UI, a lack of options, or not enough security. Recently, however, I came across a browser

Best Home Security Cameras Without Subscriptions in 2025: Save on Safety

Does the camera have the ability to listen to audio and initiate a two-way conversation using the app? Does the camera have night vision that can cover the space you have in mind? Is the app easy to understand, control and use to change settings? Does the camera work with your existing home security system or your preferred voice assistant? Can video be stored without fees? Is it local storage under your control or cloud storage? Do you have to purchase your own storage device? Can you share

Trend Micro warns of Apex One zero-day exploited in attacks

Trend Micro has warned customers to immediately secure their systems against an actively exploited remote code execution vulnerability in its Apex One endpoint security platform. Apex One is an endpoint security platform designed to automatically detect and respond to threats, including malicious tools, malware, and vulnerabilities. This critical security flaw (tracked as CVE-2025-54948 and CVE-2025-54987 depending on the CPU architecture) is due to a command injection weakness in the Apex One

ReVault flaws let hackers bypass Windows login on Dell laptops

ControlVault3 firmware vulnerabilities impacting over 100 Dell laptop models can allow attackers to bypass Windows login and install malware that persists across system reinstalls. Dell ControlVault is a hardware-based security solution that stores passwords, biometric data, and security codes within firmware on a dedicated daughterboard, known as the Unified Security Hub (USH). The five vulnerabilities, reported by Cisco's Talos security division and dubbed "ReVault," affect both the ControlV

Microsoft’s plan to fix the web with AI has already hit an embarrassing security flaw

is a senior editor and author of Notepad , who has been covering all things Microsoft, PC, and tech for over 20 years. Posts from this author will be added to your daily email digest and your homepage feed. Researchers have already found a critical vulnerability in the new NLWeb protocol Microsoft made a big deal about just just a few months ago at Build. It’s a protocol that’s supposed to be “HTML for the Agentic Web,” offering ChatGPT-like search to any website or app. Discovery of the embar

Nvidia says its AI chips don't have a 'kill switch' after Chinese accusation

Nvidia on Tuesday rejected Chinese accusations that its data center GPUs for artificial intelligence include a hardware function that could remotely deactivate the chips, which is commonly called a "kill switch." "NVIDIA GPUs do not and should not have kill switches and backdoors," wrote Nvidia's Chief Security Officer David Reber in a blog post on Tuesday. The blog post comes after the Cyberspace Administration of China said last week that it needed Nvidia to provide documents about what it c

Axon jumps 16% after TASER maker tops results and boosts outlook on security needs

Axon Enterprise 's stock popped 16% after the TASER maker surpassed Wall Street's estimates and boosted its guidance due to robust demand for its security solutions. "Demand for new technology from our customers is accelerating, and it's outpacing even my most optimistic expectations," said CEO Rick Smith on an earnings call with analysts. "There's now one breakout product driving conversations. It's everything." The security solutions company also hiked guidance for the year, saying it now ex

Axon jumps 14% after TASER maker tops results and boosts outlook on security needs

Axon Enterprise 's stock popped 14% after the TASER maker surpassed Wall Street's estimates and boosted its guidance due to robust demand for its security solutions. "Demand for new technology from our customers is accelerating, and it's outpacing even my most optimistic expectations," said CEO Rick Smith on an earnings call with analysts. "There's now one breakout product driving conversations. It's everything." The security solutions company also hiked guidance for the year, saying it now ex

The Heat Wasn't Just Outside: Cyber Attacks Spiked in Summer 2025

Summer 2025 wasn't just hot; it was relentless. Ransomware hammered hospitals, retail giants suffered data breaches, insurance firms were hit by phishing, and nation-state actors launched disruptive campaigns. From stealthy PowerShell loaders to zero-day SharePoint exploits, attackers kept defenders on their heels. This report breaks down the season's most high-impact incidents and what security teams need to do before the next wave hits. Summer Expose Healthcare's Growing Ransomware Risk H

Knowing these 7 rules helped me optimize my home security camera for the best footage

Maria Diaz/ZDNET If you're a subscriber to the Nextdoor app, you've seen plenty of footage of prowling ne'er-do-wells caught in the eye of a video doorbell or home security camera. Hopefully, you don't have your own first-hand experience with suspicious characters milling around your front porch, or far worse. Also: Unplugging these 7 common household devices helped reduce my electricity bills For good reason, security cameras continue to grow in popularity, and we can expect them to become e

SonicWall urges customers to disable SSLVPN amid reports of ransomware attacks

Enterprise security company SonicWall is urging its customers to disable a core feature of its most recent line-up of firewall devices after security researchers reported an uptick in ransomware incidents targeting SonicWall customers. In a statement this week, SonicWall said it had observed a “notable increase” of security incidents targeting its Generation 7 firewalls where customers have its VPN enabled. The company said it is “actively investigating these incidents to determine whether they

Microsoft increases Zero Day Quest prize pool to $5 million

Microsoft will offer up to $5 million in bounty awards at this year's Zero Day Quest hacking contest, which the company describes as the "largest hacking event in history." Last year's Zero Day Quest has also generated significant participation from the security community, following Microsoft's offer of $4 million in rewards for vulnerabilities in cloud and AI products and platforms. After the November hacking competition concluded, Microsoft announced that it had paid $1.6 million, having rece

Android gets patches for Qualcomm flaws exploited in attacks

Google has released security patches for six vulnerabilities in Android's August 2025 security update, including two Qualcomm flaws exploited in targeted attacks. The two security bugs, tracked as CVE-2025-21479 and CVE-2025-27038, were reported through the Google Android Security team in late January 2025. The first is a Graphics framework incorrect authorization weakness that can lead to memory corruption due to unauthorized command execution in the GPU micronode while executing a specific s

These protocols will help AI agents navigate our messy lives

What should these protocols say about security? Researchers and developers still don’t really understand how AI models work, and new vulnerabilities are being discovered all the time. For chatbot-style AI applications, malicious attacks can cause models to do all sorts of bad things, including regurgitating training data and spouting slurs. But for AI agents, which interact with the world on someone’s behalf, the possibilities are far riskier. For example, one AI agent, made to read and send e

Ransomware gangs join attacks targeting Microsoft SharePoint servers

Ransomware gangs have recently joined ongoing attacks targeting a Microsoft SharePoint vulnerability chain, part of a broader exploitation campaign that has already led to the breach of at least 148 organizations worldwide. Security researchers at Palo Alto Networks' Unit 42 have discovered a 4L4MD4R ransomware variant, based on open-source Mauri870 code, while analyzing incidents involving this SharePoint exploit chain (dubbed "ToolShell"). The ransomware was detected on July 27 after discove

12 Best Outdoor Security Cameras (2025): Battery-Powered, LTE, No Subscription

Compare These Security Cameras Best MicroSD Cards Photograph: Amazon Some security cameras support local storage, enabling you to record videos on the camera or a linked hub. A few hubs have built-in storage, and some provide slots for hard drives, but most rely on microSD cards. This is a quick guide on what to look for (plus some recommendations). The microSD card you choose should have fast read and write speeds so you can record high-quality video and play it back without delay. I recomm

Best Home Security Systems in 2025: Safeguard Your Home With These Top Options

SimpliSafe home security systems can be easily tailored to your needs. Just add or subtract hardware and equipment as you please. CNET When choosing a home security system for your home, you may be tempted to start by deciding between a DIY setup or professionally installed systems with monitoring services. Remember to make your decision after considering the equipment, installation, monitoring options and other features you want. Here are some bits of information to keep in mind about these pa

Palo Alto Networks agrees to buy CyberArk for $25B

In Brief Cybersecurity giant Palo Alto Networks announced on Wednesday its intent to acquire identity management and security company CyberArk for $25 billion. The deal, a mix of cash and stock, marks Palo Alto’s entrance into the identity security space, according to a company press release. Palo Alto has been on a shopping spree since Nikesh Arora took over as CEO and chairman of the company in 2018, according to the Financial Times, which estimated the company has spent more than $7 billion

Google Will Use AI to Guess People’s Ages Based on Search History

Last week, the United Kingdom began requiring residents to verify their ages before accessing online pornography and other adult content, all in the name of protecting children. Almost immediately, things did not go as planned—although, they did go as expected. As experts predicted, UK residents began downloading virtual private networks (VPNs) en masse, allowing them to circumvent age verification, which can require users to upload their government IDs, by making it look like they’re in a diff

Yes, You Can Bundle Other Cybersecurity Services With Some VPNs. But Is It a Good Idea?

If all you’re using to protect your digital privacy and security is a VPN and your own vigilance, you’re still leaving yourself vulnerable to various online threats like phishing, malware, identity theft and ransomware. To fully protect yourself, you need to start putting together an arsenal of privacy and security tools. Using a trustworthy VPN is a great start because a VPN can boost your online privacy by encrypting your internet traffic and masking your true IP address. But a VPN is only on

Supporting the BEAM community with free CI/CD security audits

Keep up to date with the latest news, best practice ideas and exclusive offers. Don’t miss out. Sign up here. Sign up for our quarterly newsletter At Erlang Solutions, our support for the BEAM community is long-standing and built into everything we do. From contributing to open-source tools and sponsoring events to improving security and shaping ecosystem standards, we’re proud to play an active role in helping the BEAM ecosystem grow and thrive. One way we’re putting that support into action

AI-powered Cursor IDE vulnerable to prompt-injection attacks

A vulnerability that researchers call CurXecute is present in almost all versions of the AI-powered code editor Cursor, and can be exploited to execute remote code with developer privileges. The security issue is now identified as CVE-2025-54135 and can be leveraged by feeding the AI agent a malicious prompt to trigger attacker-control commands. The Cursor integrated development environment (IDE) relies on AI agents to help developers code faster and more efficiently, allowing them to connect

Understanding the Complete Identity Management Ecosystem

Confused by the growing identity management landscape? This comprehensive guide breaks down every IAM category—from traditional workforce identity to emerging AI agents. Learn how CIAM, PAM, Zero Trust, and 15+ other solutions connect in the modern security ecosystem. 🔐 Identity management has grown from simple password systems into a complex web of specialized tools and technologies. Each piece serves a specific purpose, but understanding how they all fit together can be confusing. This guide