Latest Tech News

Stay updated with the latest in technology, AI, cybersecurity, and more

Filtered by: uri Clear Filter

How VPNs are helping people evade increased censorship - and much more

Charlie Osborne/ZDNET Follow ZDNET: Add us as a preferred Google source on Chrome and Chromium browsers. ZDNET's key takeaways Increased concern about surveillance and censorship is driving more VPN downloads. VPN providers are transforming one-and-done encrypted tunnels into holistic security suites. NordVPN is preparing for privacy protection in a post-quantum future. VILNIUS, Lithuania -- Many VPN providers have noticed an uptick in downloads and installation of their software in recent

Apple updates macOS Sequoia to version 15.6.1

In addition to releasing iOS 18.6.2, Apple has updated macOS Sequoia to version 15.6.1. The release is likely just a security update as all attention shifts to macOS Tahoe 26, due out as soon as next month. Apple released macOS 15.6, which focused on another bug fix, at the end of last month. Alongside macOS 15.6.1, Apple has issued two older macOS updates: macOS 14.7.8 and macOS 13.7.8. Apple supports older macOS versions, especially with security updates, for several years. Apple will like

Hackers steal Microsoft logins using legitimate ADFS redirects

Hackers are using a novel technique that combines legitimate office.com links with Active Directory Federation Services (ADFS) to redirect users to a phishing page that steals Microsoft 365 logins. The method lets attackers bypass traditional URL-based detection and the multi-factor authentication process by leveraging a trusted domain on Microsoft's infrastructure for the initial redirect. Legitimacy of a trusted redirect Researchers at Push Security, a company that provides protection solut

Why email security needs its EDR moment to move beyond prevention

Security leaders today are rethinking email security, not because traditional methods have failed outright, but because the threat landscape and business needs have evolved beyond what legacy approaches can handle. A surprising but apt analogy keeps surfacing: email security is stuck where antivirus (AV) was a decade ago, and it’s time it evolved like AV did, into an element of EDR. The comparison might not be obvious at first. After all, email and endpoints seem like apples and oranges. But

Vendors that treat single sign-on as a luxury feature

Why does this exist? Single sign-on (SSO) is a mechanism for outsourcing the authentication for your website (or other product) to a third party identity provider, such as Google, Okta, Entra ID (Azure AD), PingFederate, etc. In this context, SSO refers to a SaaS or similar vendor allowing a business client to manage user accounts via the client’s own identity provider, without having to rely on the vendor to provide strong authentication with audit logs, and with the ability to create and del

The SSO Wall of Shame – Vendors that treat SSO as luxury feature

Why does this exist? Single sign-on (SSO) is a mechanism for outsourcing the authentication for your website (or other product) to a third party identity provider, such as Google, Okta, Entra ID (Azure AD), PingFederate, etc. In this context, SSO refers to a SaaS or similar vendor allowing a business client to manage user accounts via the client’s own identity provider, without having to rely on the vendor to provide strong authentication with audit logs, and with the ability to create and del

Staff disquiet as Alan Turing Institute faces identity crisis

When the UK government announced the creation of the Alan Turing Institute in 2014 it promised a “fitting memorial” to the renowned computer scientist and artificial intelligence pioneer. More than a decade on, Britain’s leading AI institute is in turmoil as staff warn it may be in danger of collapse and ministers demand a shift in focus to defence and security work. “The ATI brand is well recognised internationally,” says Dame Wendy Hall, a professor of computer science at the University of S

Elastic rejects claims of a zero-day RCE flaw in Defend EDR

Enterprise search and security company Elastic is rejecting reports of a zero-day vulnerability impacting its Defend endpoint detection and response (EDR) product. The company's statement follows a blog post from a company called AshES Cybersecurity claiming to have discovered a remote code execution (RCE) flaw in Elastic Defend that would allow an attacker to bypass EDR protections. Elastic’s Security Engineering team "conducted a thorough investigation" but could not find "evidence supportin

Apple Is Making All Four iPhone 17 Models in India in a Big Pivot From China, Report Says

Apple is manufacturing all four of its iPhone 17 models in India ahead of next month's launch, according to Bloomberg. That marks a first for the company, as it tries to mitigate the effects of President Donald Trump's tariffs on products produced in China. The production is taking place at five Indian factories. Tata Group is managing half of the manufacturing in new plants in the southern state Tamil Nadu and Taiwan's Foxconn will be manufacturing iPhones near the Bangalore airport. India ha

Horror Story Looms as Children Get Stuffed Animals Powered by AI

From Steven Spielberg's creepy "AI" (2001) to M3GAN (2022), toys imbued with artificial intelligence have been a source of fascination and terror in pop culture for decades. Now, in the face of all those cautionary tales, a new class of vaguely menacing chatty toys are being sold online — but unlike the "Gremlin"-esque Furbies of yore, these are powered by cutting-edge AI, and their danger quotient lies in what they may tell children or share with outside companies. As the New York Times repor

Over 800 N-able servers left unpatched against critical flaws

Over 800 N-able N-central servers remain unpatched against a pair of critical security vulnerabilities tagged as actively exploited last week. N-central is a popular platform used by many managed services providers (MSPs) and IT departments to monitor and manage networks and devices from a centralized web-based console. Tracked as CVE-2025-8875 and CVE-2025-8876, the two flaws can let authenticated attackers to inject commands due to improper sanitization of user input and execute commands on

WIRED Tests Dozens of Air Purifiers a Year. Here’s What We Look For (2025)

If I put a box on its side and cannot grasp the product to lift it from its box, then that’s the first strike. WIRED considers accessibility, and this means handles and wheels on heavier air purifiers. When I review a unit, I think about those with less upper body strength moving the appliances, and whether they'd be able to maneuver it around their home. I move air purifiers all around my apartment; I shouldn’t have to bend at the knees to adjust a purifier's location. Photograph: Lisa Wood Sh

SystemD Service Hardening

Controversy aside, systemd provides us a very complete, robust method of controlling services (amongst a multitude of other Linux things). For a lot of things though, this is optimized for success out of the box and not necessarily security. Such is the way of many IT endeavors. This doc though is meant to provide a snapshot of a number of hardening options that you can apply to systemd service units and podman quadlets to increase the overall security posture and reduce both the likelihood of c

Russia Is Cracking Down on End-to-End Encrypted Calls

WIRED copublished an investigation this week with The Markup and CalMatters showing that dozens of data brokers have been hiding their opt-out and personal-data-deletion tools from Google Search, making it harder for people to find and utilize them. The report prompted US senator Maggie Hassan to demand accountability from the companies. WIRED also took a deep dive looking at what the data-analysis giant Palantir actually does. Reports this week that Russia was likely involved in, or entirely b

Cisco patches critical security hole in Firewall Management Center - act now

Olemedia/iStock/Getty Images Plus via Getty Images ZDNET's key takeaways Cisco's Secure Firewall Management Center security hole is as bad as they get. There is no mitigation and no workaround. Patch immediately. So far, no confirmed active exploits have been confirmed. Get more in-depth ZDNET tech coverage: Add us as a preferred Google source on Chrome and Chromium browsers. Do you use Cisco's Secure Firewall Management Center (FMC) software? If your company operates a serious network usi

Using AI to secure AI

One of Anthropic's quieter releases recently was their "Security Review," where Claude Code can identify and fix security issues in your code. But how good is it really? In my case, will it find issues with code it helped me write for my newsletter service and Chrome extension? The release states it uses a "specialized security-focused prompt that checks for common vulnerability patterns." After throwing so much compute at model training, LLMs are nearing the top of the S-Curve, so finding ways

Rain: Transiently Leaking Data from Public Clouds Using Old Vulnerabilities

OpenReview Anonymous Preprint Submission696 Authors Keywords : Cloud computing security; Hardware security; Systems security TL;DR : Leaking memory across virtual machine boundaries at a public cloud provider, bypassing mitigations against these types of attacks. Abstract : Given their vital importance for governments and enterprises around the world, we need to trust public clouds to provide strong security guarantees even in the face of advanced attacks and hardware vulnerabilities. While t

Letting inmates run the asylum: Using AI to secure AI

One of Anthropic's quieter releases recently was their "Security Review," where Claude Code can identify and fix security issues in your code. But how good is it really? In my case, will it find issues with code it helped me write for my newsletter service and Chrome extension? The release states it uses a "specialized security-focused prompt that checks for common vulnerability patterns." After throwing so much compute at model training, LLMs are nearing the top of the S-Curve, so finding ways

Government's Intel intervention is 'essential' for national security, tech analyst says

A government intervention in struggling chipmaker Intel is "essential" for the sake of national security, analyst Gil Luria said Friday, following a report that the Trump administration is weighing taking a stake in the company. "We're all capitalists," Luria, head of technology research at D.A. Davidson, said in an interview with CNBC's "Squawk Box." "We don't want government to intervene and own private enterprise, but this is national security." Bloomberg reported Thursday that the Trump ad

Microsoft reminds of Windows 10 support ending in two months

Microsoft has reminded customers that Windows 10 will be retired in two months after all editions of Windows 10, version 22H2 reach their end of servicing on October 14. On the same date, Windows 10 2015 LTSB and Windows 10 IoT Enterprise LTSB 2015 will also reach the end of extended support. After Windows 10 is retired, Microsoft will no longer provide bug fixes or technical assistance for issues affecting the system's security, stability, or usability. "On October 14, 2025, Windows 10, vers

UK's Turing AI Institute responds to staff anger about defence focus

UK's Turing AI Institute responds to staff anger about defence focus Technology Secretary Peter Kyle wants the Alan Turing Institute to focus on defence In a letter seen by the BBC, Chair Dr Doug Gurr said the Turing Institute would "step up at a time of national need". They warned that the body - which receives £100m from the government - is at risk of collapse after Technology Secretary Peter Kyle instructed it to prioritise defence, and threatened to pull its funding if it did not. It com

Plex warns users to patch security vulnerability immediately

Plex has notified some of its users on Thursday to urgently update their media servers due to a recently patched security vulnerability. The company has yet to assign a CVE-ID to track the flaw and didn't provide additional details regarding the patch, only saying that it impacts Plex Media Server versions 1.41.7.x to 1.42.0.x. Yesterday, four days after releasing security updates that addressed the mysterious security bug, Plex emailed those running affected versions to update their software

Tired of Those Constant Nighttime Pee Runs? Treat the Tinkles With These Tips

Few things ruin a good night's rest like having to get out of a warm, comfortable bed to use the bathroom. That quick trip can be enough to break up iyour sleep, and once it happens, falling back asleep is not always easy. But at the same time, you don't want to stay uncomfortable while trying to drift off. So what do you do? When it happens more than once in a single night, the impact can be even worse. Interrupted sleep leaves you groggy the next morning and can make it harder to get through

Computing’s Top 30: Zhihao “Zephyr” Yao

On a typical mobile device today, financial and medical apps nestled up next to everything from karaoke playlists to time-killing games like Fruit Ninja. How to secure data that matters in this diverse digital buffet is a challenge for many researchers. For Zhihao “Zephyr” Yao, it’s a challenge that fuels his life’s work and also led to an award-winning project. That project—which earned ACM MobiSys 2023’s Best Artifact Award—demonstrated that making systems less complex can actually enhance m

Canada’s House of Commons investigating data breach after cyberattack

The House of Commons of Canada is currently investigating a data breach after a threat actor reportedly stole employee information in a cyberattack on Friday. While the lower house of the Parliament of Canada has yet to issue a public statement regarding this incident, CBC News reports that House of Commons staff were notified of a breach on Monday via email. The alert states that the attacker exploited a recent Microsoft vulnerability to gain access to a database containing sensitive informat

Microsoft patches more than 100 Windows security flaws - update your PC now

Elyse Betters Picaro / ZDNET ZDNET's key takeaways The August Patch Tuesday update for Windows fixes 107 security flaws. Among all the security flaws, 13 are ranked as critical. Also adds the new Black Screen of Death and Quick Machine Recovery. Microsoft's August Patch Tuesday update adds a couple of cool new features. But the main reason you'll want to install it is to squash a large array of security bugs. Patches 107 flaws, including 13 critical Released this past Tuesday, the latest

I’m Watching Every Conjuring Movie Before 'The Conjuring: Last Rites.' Here’s Where to Stream Them All

When The Conjuring debuted in 2013, directed by James Wan, the movie felt like a throwback to atmospheric 1970s horror flicks such as The Changeling or The Manitou. From its simple opening title card -- yellow text on a black background -- to its relatively little gore and slow build of suspense, The Conjuring was a breath of fresh air. It arrived at a time when the horror genre was rampant with gruesome movies like Saw (which was also directed by Wan) and Hostel. The Conjuring kick-started not

CISA warns of N-able N-central flaws exploited in zero-day attacks

​CISA warned on Wednesday that attackers are actively exploiting two security vulnerabilities in N‑able's N-central remote monitoring and management (RMM) platform. N-central is commonly used by managed services providers (MSPs) and IT departments to monitor, manage, and maintain client networks and devices from a centralized web-based console. According to CISA, the two flaws can allow threat actors to gain command execution via an insecure deserialization weakness (CVE-2025-8875) and inject

Fortinet warns of FortiSIEM pre-auth RCE flaw with exploit in the wild

Fortinet is warning about a remote unauthenticated command injection flaw in FortiSIEM that has in-the-wild exploit code, making it critical for admins to apply the latest security updates. FortiSIEM is a central security monitoring and analytics system used for logging, network telemetry, and security incident alerts, serving as an integral part of security operation centers, where it's an essential tool in the hands of IT ops teams and analysts. The product is generally used by governments,

Report: Apple planning ecosystem of home security devices to compete with Ring and Nest

A new report from Bloomberg dives deep into Apple’s plans to lean on artificial intelligence as a way to expand into robotics, home security, and smart displays. One interesting tidbit in the report is that Apple is aiming to develop a system of smart home cameras and other home security products to compete with the likes of Amazon’s Ring brand. Bloomberg first reported that Apple was developing a home doorbell with support for Face ID last December. As it turns out, the company’s ambitions ex