Latest Tech News

Stay updated with the latest in technology, AI, cybersecurity, and more

Filtered by: ack Clear Filter

Iterative DFS with stack-based graph traversal (2024)

Depth-first search (DFS) on a graph (binary tree or otherwise) is most often implemented recursively, but there are occasions where it may be desirable to consider an iterative approach instead. Such as when we may be worried about overflowing the call stack. In such cases it makes sense to rely on implementing DFS with our own stack instead of relying on our program's implicit call stack. But doing so can lead to some problems if we are not careful. Specifically, as noted in another blog post,

2.5B Gmail users endangered after Google database hack

How the phishing attacks work Initial reports of attempted attacks have already been seen on Reddit, which are likely related to the data leak. Users describe how alleged Google employees have contacted them by phone to inform them of a security breach in their accounts. In these scam attempts, attackers are trying to take over Gmail accounts by triggering alleged “account resets” and then intercepting passwords to subsequently lock out the account holders. Another attack method involves “dang

Making games in Go: 3 months without LLMs vs. 3 days with LLMs

Introduction After 15 years as a software engineer, I realized I had never actually built and published a game. Since I grew up in 🇦🇷 Argentina playing card games with my friends, I figured I’d choose one of those. I asked myself: Truco: 3 Months Without LLMs On June 18th of 2024 I started building Truco in my free time. As a longtime Go backend developer, the backend was obvious. The challenge was the UI and long-term hosting without a paid server. Problem Solution UI Bit the bullet and le

Making Games in Go: 3 Months Without LLMs vs. 3 Days with LLMs

Introduction After 15 years as a software engineer, I realized I had never actually built and published a game. Since I grew up in 🇦🇷 Argentina playing card games with my friends, I figured I’d choose one of those. I asked myself: Truco: 3 Months Without LLMs On June 18th of 2024 I started building Truco in my free time. As a longtime Go backend developer, the backend was obvious. The challenge was the UI and long-term hosting without a paid server. Problem Solution UI Bit the bullet and le

Katee Sackhoff Talks ‘The Mandalorian’ and Acting Struggles

Battlestar Galacta alum Katee Sackhoff has been in genre TV for years. After voicing cultist turned mercenary/freedom fighter Bo-Katan Kryze for Star Wars: The Clone Wars and Rebels, she reprised the role in the live-action series The Mandalorian. She’s gotten to play Bo several times since then, but as the actor herself tells it, coming back to that role hasn’t been without its challenges. In the latest episode of her podcast, Sackhoff told her Battlestar co-worker Tahmoh Penikett how she lost

Can't Get Your Baby to Calm Down? Try This Hidden iPhone Feature

Comforting a crying baby can be difficult, especially if you aren't getting enough sleep. According to the American Academy of Pediatrics, playing calming sounds via a white noise machine can help soothe your baby and get them to settle down -- and give you a moment of respite. But instead of buying a white noise machine, you could save money and use your iPhone instead. When Apple released iOS 15 in 2021, the operating system brought a hidden feature to your iPhone called Background Sounds. It

Apple AirTag 2 Rumors: New Features and Possible Release Date Leaked

The original AirTag was launched nearly four years ago, which is practically a lifetime for an Apple product. The little tracker has proven to be a sleeper hit with plenty of people the world over using it to find their keys, wallet, luggage and various personal belongings. But four years is a long time, and it's time this smart tracker sees an update. That sort of delay is unusual for Apple, which tends to refresh most of its product lines every couple of years. Now, as summer travel season wr

Ergonomic errors in Rust: write fast, debug with ease, handle precisely

Ergonomic errors in Rust: write fast, debug with ease, handle precisely Errors show up in three distinct contexts: when you’re writing code, when you’re debugging code, and at runtime when the program needs to handle recoverable errors. And errors are consumed by two distinct consumers with different needs: the developer debugging an application, and the caller making error handling decisions at runtime. In this post, we’ll explore how stackerror is designed to make working in all three contex

‘Star Wars: Visions’ Season 3 Puts a Stormtrooper on Death’s Door

Over its currently two-season run, Star Wars: Visions has shown audiences the adventures of Force users, droids, and rebels. One viewpoint we’ve not seen much of is the Imperial forces, despite their repeatedly turning up in the show’s various shorts—but that’s changing with the new season, and things will get pretty cerebral. During this weekend’s Anime NYC, panelists got a look at “Black,” a short for the next set of episodes dropping in October. Developed by david production (Fire Force), th

Much of the World Stops Sending Mail to U.S.

Do you have a package coming your way from overseas? (I do, it’s a gift, and I’m very annoyed.) Hopefully it’s not urgent, because it’s going to be a minute before that thing gets to our shores. Questions surrounding the Trump administration’s ongoing tariff regime, including a policy to end an exemption from taxing small packages, have resulted in postal services across the world simply choosing not to ship to the United States until things get sorted out, according to Bloomberg. Central to th

Have You Ever Seen a Black Moon? Neither Have We, but One Is Coming This Weekend

Late last year, we were treated to four consecutive supermoons, where the moon is the biggest and brightest that it can possibly be in the night sky. Have you ever wondered what it's called when the opposite happens? There is a name for it, and it's happening this weekend -- the emergence of the black moon. The term black moon isn't an official term, but rather a nickname for when a new moon fulfills certain conditions. Typically, each season has three new moons just like it has three full moon

APT36 hackers abuse Linux .desktop files to install malware in new attacks

The Pakistani APT36 cyberspies are using Linux .desktop files to load malware in new attacks against government and defense entities in India. The activity, documented in reports by CYFIRMA and CloudSEK, aims at data exfiltration and persistent espionage access. APT 36 has previously used .desktop files to load malware in targeted espionage operations in South Asia. The attacks were first spotted on August 1, 2025, and based on the latest evidence, are still ongoing. Desktop file abuse Altho

Arch Linux remains under attack as DDoS enters week 2 - here's a workaround

atese/iStock/Getty Images Plus via Getty Images Follow ZDNET: Add us as a preferred source on Google. ZDNET's key takeaways All Arch Linux sites are under attack. No one knows why Arch is getting smacked around. You can get Arch Linux files and programs from GitHub. Although not well-suited for new users, Arch Linux is a popular distro with a passionate fan base. So, why has someone been knocking down the Arch Linux site repeatedly for over a week now with an ongoing distributed denial-o

Kimbal Musk on Elon's Tesla pay package: 'My brother deserves to be paid'

Kimbal Musk, the younger brother of the world's wealthiest person, said Elon Musk "deserves to be paid," as Tesla remains locked in a legal saga over its CEO's pay package. "I think my brother deserves to be paid," Kimbal Musk said on CNBC's "Squawk Box" on Friday. "He has zero pay for the past six to eight years. I don't think that's right. I'll let Tesla shareholders make that decision, but I believe that it does need to be. He needs to be paid." Elon Musk isn't paid a salary or any cash bon

AirPods turn into AirTag in this clever use case

AirPods aren’t just the best headphones. AirPods can also act like an AirTag, which happened to a North Carolina family traveling internationally when a pickpocketer stole the bag containing their passport and ID. AirPods help track stolen purse in Italy Karis McElroy shared the story on TikTok: Her mother and stepfather were visiting Venice, Italy, when three people crowded around them on the street. Once they made it to their Airbnb, McElroy’s mom discovered her backpack had been unzipped.

Spotify gets deeper Instagram integration

Spotify is expanding how users can share their music on Instagram with two new features rolling out globally today. Audio previews in Stories Audio previews are now included when posting tracks to Stories, while Instagram Notes gets real-time music updates that show what you are currently listening to. Sharing songs to Instagram Stories now includes a short audio clip automatically. Friends can listen to the preview directly in the Story and tap the music sticker to open the full track in Spo

Instagram adds Spotify integration to Stories and Notes

Spotify and Instagram are cozying up for more seamless music sharing. Two new features make it easier for Spotify's nearly 700 million users to share their favorite tunes. When sharing a Spotify track to Instagram Stories, a short snippet of the song will now be included. When people view the story, they'll have an option to open the track in Spotify. They can do that by tapping the music sticker on your post. Spotify Along similar lines, Instagram Notes now lets you show your friends what yo

Hackers who exposed North Korean government hacker explain why they did it

Earlier this year, two hackers broke into a computer and soon realized the significance of what this machine was. As it turned out, they had landed on the computer of a hacker who allegedly works for the North Korean government. The two hackers decided to keep digging and found evidence that they say linked the hacker to cyberespionage operations carried out by North Korea, exploits and hacking tools, and infrastructure used in those operations. Saber, one of the hackers involved, told TechCru

AirPods act like AirTags in helping traveler recover pickpocketed wallet

AirPods aren’t just the best headphones. AirPods can also act like an AirTag, which happened to a North Carolina family traveling internationally when a pickpocketer stole the bag containing their passport and ID. AirPods help track stolen purse in Italy Karis McElroy shared the story on TikTok: Her mother and stepfather were visiting Venice, Italy, when three people crowded around them on the street. Once they made it to their Airbnb, McElroy’s mom discovered her backpack had been unzipped.

Spotify adds audio previews and real-time music sharing to Instagram Stories and Notes

Spotify is expanding how users can share their music on Instagram with two new features rolling out globally today. Audio previews in Stories Audio previews are now included when posting tracks to Stories, while Instagram Notes gets real-time music updates that show what you are currently listening to. Sharing songs to Instagram Stories now includes a short audio clip automatically. Friends can listen to the preview directly in the Story and tap the music sticker to open the full track in Spo

Meta allegedly bypassed Apple privacy measure, and fired employee who flagged it

A former Meta product manager has claimed that the social network circumvented Apple’s privacy protections, as well as cheating advertisers, and fired him when he repeatedly raised the issue internally. Meta is said to have found ways to identify Apple users even after they refused consent for app tracking, in order to avoid an estimated $10 billion loss of revenue … App Tracking Transparency hit Meta hard Meta relied heavily on selling personalized advertising, which required it to be able t

Weaponizing image scaling against production AI systems

Picture this: you send a seemingly harmless image to an LLM and suddenly it exfiltrates all of your user data. By delivering a multi-modal prompt injection not visible to the user, we achieved data exfiltration on systems including the Google Gemini CLI. This attack works because AI systems often scale down large images before sending them to the model: when scaled, these images can reveal prompt injections that are not visible at full resolution. In this blog post, we’ll detail how attackers c

I love Slack's new Lists feature so much I wish it was a standalone app

jayk7/Moment/Getty Images ZDNET's key takeaways Slack has a new Lists feature that levels up your productivity. You can create boards and lists to track your projects. There's also a template gallery to make using Lists easier. Get more ZDNET: Add us as a preferred Google source on Chrome and Chromium browsers. I use Slack -- a lot. Several of my clients require Slack for communication and collaboration. Because I write so much for several organizations, it's easy to get lost in the pr

How to Track Hurricane Erin: See Which States Are Currently at Risk

As Hurricane Erin heads north up the East Coast this Wednesday, residents are paying close attention to see where the storm will land and which cities may be in danger. As we write this on Wednesday afternoon, Erin is now a 110-mph Category 2 hurricane, but that can change quickly. Read more: Beyond Boarding Up: How to Prep Your Smart Home Security for a Hurricane The latest projections show the storm aiming for Boston, but veering back out into the Atlantic before causing too much damage. How

This is the Ultimate '90s Cyberpunk Movie (No, It's Not 'The Matrix')

The cyberpunk movement has given us some of the best science fiction movies: Blade Runner, Ghost in the Shell and, yes, The Matrix. But there's one great tech noir flick that came out at the height of the cyberpunk craze -- and then all but disappeared. Maybe that's partly because of its title. I'd wanted to rewatch Strange Days for a long time, but I kept forgetting because, honestly, I couldn't remember what it was called. Then I finally rediscovered the sci-fi thriller on Hulu. After my most

How to Track Hurricane Erin: See Which States Are Currently At Risk

As Hurricane Erin heads north up the East Coast this Wednesday, residents are paying close attention to see where the storm will land and which cities may be in danger. As we write this on Wednesday afternoon, Erin is now a 110-mph Category 2 hurricane, but that can change quickly. Read more: Beyond Boarding Up: How to Prep Your Smart Home Security for a Hurricane The latest projections show the storm aiming for Boston, but veering back out into the Atlantic before causing too much damage. How

Major password managers can leak logins in clickjacking attacks

Six major password managers with tens of millions of users are currently vulnerable to unpatched clickjacking flaws that could allow attackers to steal account credentials, 2FA codes, and credit card details. Threat actors could exploit the security issues when victims visit a malicious page or websites vulnerable to cross-site scripting (XSS) or cache poisoning, where attackers overlay invisible HTML elements over the password manager interface. While users believe they are interacting with h

Onimusha: Way of the Sword might be a more forgiving kind of samurai epic

Capcom’s Onimusha series has been on a long hiatus. Combining Resident Evil-style rendered backgrounds with more agile characters, adding in demons, magic and a feudal Japan setting, the series span multiple sequels — and consoles — til the fourth entry in 2006. Roughly two decades (and console eras) later, Capcom has returned to the series, even getting the definitive samurai actor, Tom Cruise Mifune Toshiro, to play the hero, the legendary swordsman Miyamoto Musashi. At Gamescom, the company

The Block Stacking Problem

The Block Stacking Problem John D. Norton Department of History and Philosophy of Science University of Pittsburgh https://sites.pitt.edu/~jdnorton/jdnorton.html February 21, 2025 1. Introduction In the block stacking problem, a collection of blocks are to be stacked at a table edge. If we stack the blocks so that they protrude past the edge of the table, how far can they go horizontally? The curious and then surprizing result is that we can extend the stack horizontally arbitrarily far.

Analysis of the GFW's Unconditional Port 443 Block on August 20, 2025

1. Introduction Between approximately 00:34 and 01:48 (Beijing Time, UTC+8) on August 20, 2025, the Great Firewall of China (GFW) exhibited anomalous behavior by unconditionally injecting forged TCP RST+ACK packets to disrupt all connections on TCP port 443. This incident caused massive disruption of the Internet connections between China and the rest of the world (source1 and source2). This report documents our measurements and analysis of this temporary, widespread blocking event. Our primar

Topics: ack flags ip length tcp