Latest Tech News

Stay updated with the latest in technology, AI, cybersecurity, and more

Filtered by: sec Clear Filter

Best Home Security Cameras With Floodlights in 2025: Illuminate Your Yard

Does the camera have night vision? Does it have extra features like color night vision? Does the floodlight camera have adjustable motion detection? Does it have motion zones or sensitivity options? Does it include objection recognition for people? Are there extra costs for these features? Do you prefer a wired or wireless camera? Do you have a junction box where you want to install a wired camera or are you willing to have one installed? Can you control the brightness of the camera's floodli

Blackwater’s founder would like to sell you a privacy phone made in the USA

Unplugged, a company cofounded and backed by Erik Prince, who is also the founder of infamous private military contractor Blackwater, has just released a new version of its “privacy-first” UP Phone that will be made in the US — at some point. The original UP Phone was described by the company as “the ultimate privacy-focused smartphone” and by privacy platform GrapheneOS as “a clear cut scam.” (It was first announced in June 2022, though it didn’t reach customers until 2024; Unplugged wouldn’t

A Unified Approach to Branch Security and SD-WAN: Streamlining Operations

The way we work has fundamentally shifted, with hybrid and remote models becoming a widespread reality. This evolution brings tremendous benefits but also presents significant challenges for IT and security teams tasked with ensuring seamless access to applications and protecting sensitive data outside the traditional corporate perimeter. Traditionally, network deployments often routed all internet traffic back to a central site through a perimeter firewall. While this provided security, backha

The ex-CIA agents deciding Facebook's content policy (2022)

It is an uncomfortable job for anyone trying to draw the line between “harmful content and protecting freedom of speech. It’s a balance”, Aaron says. In this official Facebook video, Aaron identifies himself as the manager of “the team that writes the rules for Facebook”, determining “what is acceptable and what is not.” Thus, he and his team effectively decide what content the platform’s 2.9 billion active users see and what they don’t see. Aaron is being interviewed in a bright warehouse-turn

Google will now let you pick your top sources for search results

Google is rolling out a new feature called “Preferred Sources” in the U.S. and India, which allows users to select their preferred choice of news sites and blogs to be shown in the Top Stories section of Google’s search results. Enabling this feature means you will see more content from the sites you like, the company says. When users search for a particular topic, they will see a “star” icon next to the Top Stories section. They can tap on that icon and start adding sources by searching for th

Samsung’s second One UI 8 Watch beta is finally here

Ryan Haines / Android Authority TL;DR Samsung has released the second One UI 8 Watch beta software. The update fixes a few bugs, including the lift-to-wake gesture not working in some situations. This comes over a month after the release of the first One UI 8 Watch beta. Samsung launched the first One UI 8 Watch beta back in June, allowing Galaxy Watch 7 and Ultra owners to go hands-on with the upcoming software. It’s taken a while, but the second beta is now rolling out in at least one mark

275M patient records breached—How to meet HIPAA password manager requirements

In 2024, the healthcare sector experienced over 700 data breach incidents, which is higher than any other industry, including finance. These breaches exposed more than 275 million patient records, with password-related vulnerabilities serving as the primary attack vector in most of the cases. While threat actors use various penetration methods, compromised credentials remain the most consistent and damaging entry point. These statistics reflect a fundamental threat to patient and organizationa

Trump strikes “wild” deal making US firms pay 15% tax on China chip sales

Ahead of an August 12 deadline for a US-China trade deal, Donald Trump's tactics continue to confuse those trying to assess the country's national security priorities regarding its biggest geopolitical rival. For months, Trump has kicked the can down the road regarding a TikTok ban, allowing the app to continue operating despite supposedly urgent national security concerns that China may be using the app to spy on Americans. And now, in the latest baffling move, a US official announced Monday t

Cutting Through the Security Noise: How XDR helps Teams Focus on Real Threats

Extended Detection and Response (XDR) is a modern security technology designed primarily as a Security Operations Centre (SOC) enabler tool. It addresses the complexities and challenges faced by security teams in today’s evolving threat landscape. The core idea behind XDR is to take challenging incident response processes and make security analysts more effective, even at more junior levels. The term XDR itself has emerged over the last few years and can be seen as somewhat nebulous, with diffe

Hyundai wants Ioniq 5 owners to pay to fix a keyless entry security hole

is a senior editor and author of Notepad , who has been covering all things Microsoft, PC, and tech for over 20 years. Posts from this author will be added to your daily email digest and your homepage feed. Hyundai is now offering an “optional” security upgrade for the Ioniq 5 in the UK that prevents the car being stolen with a Game Boy-like device. Hyundai wants some Ioniq 5 owners to pay a £49 ($65) to upgrade hardware and software components to prevent thieves using handheld devices to unlo

The SEC Just Quietly Surrendered in Its Biggest Crypto Battle

The crypto world’s biggest and most consequential legal war is finally over. Ripple Labs, a fintech giant, has just closed the book on its nearly five-year battle with the U.S. Securities and Exchange Commission, ending a fight that had become a proxy for the future of cryptocurrency regulation in America. The surprise settlement is being hailed as a landmark victory for the crypto industry and a significant blow to the SEC’s controversial “regulation by enforcement” strategy. The “SEC announc

Did California's fast food minimum wage reduce employment?

We analyze the effect of California's $20 fast food minimum wage, which was enacted in September 2023 and went into effect in April 2024, on employment in the fast food sector. In unadjusted data from the Quarterly Census of Employment and Wages, we find that employment in California's fast food sector declined by 2.7 percent relative to employment in the fast food sector elsewhere in the United States from September 2023 through September 2024. Adjusting for pre-AB 1228 trends increases this di

Encryption made for police and military radios may be easily cracked

Two years ago, researchers in the Netherlands discovered an intentional backdoor in an encryption algorithm baked into radios used by critical infrastructure–as well as police, intelligence agencies, and military forces around the world–that made any communication secured with the algorithm vulnerable to eavesdropping. When the researchers publicly disclosed the issue in 2023, the European Telecommunications Standards Institute (ETSI), which developed the algorithm, advised anyone using it for

Did California's Fast Food Minimum Wage Reduce Employment?

We analyze the effect of California's $20 fast food minimum wage, which was enacted in September 2023 and went into effect in April 2024, on employment in the fast food sector. In unadjusted data from the Quarterly Census of Employment and Wages, we find that employment in California's fast food sector declined by 2.7 percent relative to employment in the fast food sector elsewhere in the United States from September 2023 through September 2024. Adjusting for pre-AB 1228 trends increases this di

Ex-NSA Chief Paul Nakasone Has a Warning for the Tech World

The Trump administration's radical changes to United States fiscal policy, foreign relations, and global strategy—combined with mass firings across the federal government—have created uncertainty around US cybersecurity priorities that was on display this week at two of the country's most prominent digital security conferences in Las Vegas. “We are not retreating, we're advancing in a new direction,” Cybersecurity and Infrastructure Security Agency chief information officer Robert Costello said

Hackers Went Looking for a Backdoor in High-Security Safes—and Now Can Open Them in Seconds

Zhou added in his statement that Securam will be fixing the vulnerabilities Omo and Rowley found in future models of the ProLogic lock. “Customer security is our priority and we have begun the process of creating next-generation products to thwart these potential attacks,” he writes. “We expect to have new locks on the market by the end of the year.” Photograph: Ronda Churchill In a followup call, Securam director of sales Jeremy Brookes confirmed that Securam has no plan to fix the vulnerabil

It's Staggeringly Easy for Hackers to Trick ChatGPT Into Leaking Your Most Personal Data

OpenAI's ChatGPT can easily be coaxed into leaking your personal data — with just a single "poisoned" document. As Wired reports, security researchers revealed at this year's Black Hat hacker conference that highly sensitive information can be stolen from a Google Drive account with an indirect prompt injection attack. In other words, hackers feed a document with hidden, malicious prompts to an AI that controls your data instead of manipulating it directly with a prompt injection, one of the mo

Ask Engadget: What are my options when Windows 10 support ends on October 14?

Q: I'm hearing that Microsoft is pulling the plug on Windows 10 later this year. What does that mean for my current Windows 10 PC, and what are my options? A: Microsoft will officially end support for Windows 10 on October 14, 2025, a little over 10 years after the operating system was released. While you can continue to use Windows 10 PCs after that date — and it's understandable why, I gave it a glowing review at launch — you'll no longer receive any customer support, security updates or any

Why I ditched Google Chrome for Firefox Focus within 10 minutes of using the mobile browser

Jack Wallen / Elyse Betters Picaro / ZDNET ZDNET's key takeaways Firefox Focus is a security and privacy-focused mobile browser. This browser offers a minimal UI and maximum privacy features. Firefox Focus is available for both Android and iOS. I've run the gamut of web browsers on Android, and every time I think I've found "the one," I discover a reason not to use it. That reason might be a cluttered UI, a lack of options, or not enough security. Recently, however, I came across a browser

Black Hat 2025: Why your AI tools are becoming the next insider threat

Want smarter insights in your inbox? Sign up for our weekly newsletters to get only what matters to enterprise AI, data, and security leaders. Subscribe Now Cloud intrusions increased by 136% in the past six months. North Korean operatives infiltrated 320 companies using AI-generated identities. Scattered Spider now deploys ransomware in under 24 hours. However, at Black Hat 2025, the security industry demonstrated that it finally has an answer that works: agentic AI, delivering measurable resu

Secretive, Peter Thiel-Founded ‘Tech Bilderberg” Group Is Moving Up in the World

A secretive group founded by Palantir mogul Peter Thiel is planning to expand its influence in Washington, D.C., according to a report from Axios. The group, called Dialog, wants to establish a permanent physical campus in the capital, where it can carry on its invite-only meetings involving major power players. Working off information provided by a source with knowledge of the group’s activities, Axios claims that Dialog—which it says is “often compared to a tech-era Bilderberg”—has plans for

Pinterest stock falls 10% after earnings miss

Bill Ready, CEO, Pinterest, speaks at the 28th annual Milken Institute Global Conference at the Beverly Hilton in Beverly Hills, California on May 5, 2025. Pinterest shares were down more than 10% on Thursday after the company reported second-quarter earnings that missed on earnings per share. Here's how the company did, compared to analysts' consensus estimates from LSEG: Earnings per share : $0.33 cents Adj. vs. $0.35 cents expected : $0.33 cents Adj. vs. $0.35 cents expected Revenue: $998

Encryption made for police and military radios may be easily cracked

Two years ago, researchers in the Netherlands discovered an intentional backdoor in an encryption algorithm baked into radios used by critical infrastructure–as well as police, intelligence agencies, and military forces around the world–that made any communication secured with the algorithm vulnerable to eavesdropping. When the researchers publicly disclosed the issue in 2023, the European Telecommunications Standards Institute (ETSI), which developed the algorithm, advised anyone using it for

Encryption Made for Police and Military Radios May Be Easily Cracked

Two years ago, researchers in the Netherlands discovered an intentional backdoor in an encryption algorithm baked into radios used by critical infrastructure–as well as police, intelligence agencies, and military forces around the world–that made any communication secured with the algorithm vulnerable to eavesdropping. When the researchers publicly disclosed the issue in 2023, the European Telecommunications Standards Institute (ETSI), which developed the algorithm, advised anyone using it for

Computing’s Top 30: Guowen Xu

Guowen Xu’s passion for cryptography was seeded in various courses throughout his undergraduate mathematics education. It was his experience as a doctoral student, however, that was truly transformative in terms of his learning how to navigate cryptographic security’s complexities and begin shaping his research directions and career. Today, Xu is a full professor in the School of Computer Science and Engineering at the University of Electronic Science and Technology of China, Chengdu. Xu’s wor

There Is a 100 Percent Chance That Your Body Is Deeply Contaminated With Dangerous Substances

Image by Getty / Futurism Developments The start of this year marked more than a quarter of the way through the 21st century. And though 2025 might not be full of flying cars and robot servants, there are a few sci-fi tropes that ended up panning out: novels like George Orwell's "1984," and Phillip K Dick's "Do Androids Dream of Electric Sheep?" are alive and well as real-world police use expansive surveillance networks to bust criminals before they even do anything wrong, while the sex robot m

Show HN: Stasher – Burn-after-read secrets from the CLI, no server, no trust

Stasher CLI Share secrets from your terminal. One-time only. No accounts. No backend. No BS. I just wanted to share a password. Not spin up a server. Not sign up for a "secure" web app. Not trust a Slack thread. Just. Send. A. Secret. So I built Stasher — a burn-after-read, command-line tool for secure, ephemeral secret sharing. Built for people who are busy, paranoid, or both. "How Can I Trust You?" That's what someone asked me — and they were right to. Even if I say: "It's encrypted"

Library of Congress explains how parts of US Constitution vanished from its website

The Library of Congress has given a fuller explanation as to why large sections of the U.S. Constitution suddenly vanished from its official website. As TechCrunch previously reported, parts of Section 8, as well as the entirety of Section 9 and Section 10, were deleted from Article 1 of the Constitution on the U.S. government’s official website over the past month. The changes to the sections, which pertained to the Congressional powers, the rights of individual states, and the rights to due p

Debounce

Debouncing, in the context of programming, means to discard operations that occur too close together during a specific interval, and consolidate them into a single invocation. Debouncing is very similar to throttling. The key difference is that throttling enforces limits on continuous operations, while debouncing waits for invocations to stop for a specific time to consolidate many noisy invocations into one single invocation. A typical use case of debouncing is when responding to user input.

There's a Tea app for men, and it also has security problems

Tea bills itself as a safety dating app for women, allowing users to anonymously share details about men they have met. A new app called TeaOnHer has emerged that attempts to flip the script, with men sharing information about women they date. And while Tea drew scrutiny last month after a data breach revealed user information, including potentially identifying details such as phone numbers and personal anecdotes, the copycat app seems to be suffering from the same problem. TechCrunch discovere