Latest Tech News

Stay updated with the latest in technology, AI, cybersecurity, and more

Filtered by: cur Clear Filter

It's Staggeringly Easy for Hackers to Trick ChatGPT Into Leaking Your Most Personal Data

OpenAI's ChatGPT can easily be coaxed into leaking your personal data — with just a single "poisoned" document. As Wired reports, security researchers revealed at this year's Black Hat hacker conference that highly sensitive information can be stolen from a Google Drive account with an indirect prompt injection attack. In other words, hackers feed a document with hidden, malicious prompts to an AI that controls your data instead of manipulating it directly with a prompt injection, one of the mo

Ask Engadget: What are my options when Windows 10 support ends on October 14?

Q: I'm hearing that Microsoft is pulling the plug on Windows 10 later this year. What does that mean for my current Windows 10 PC, and what are my options? A: Microsoft will officially end support for Windows 10 on October 14, 2025, a little over 10 years after the operating system was released. While you can continue to use Windows 10 PCs after that date — and it's understandable why, I gave it a glowing review at launch — you'll no longer receive any customer support, security updates or any

The GPT-5 Launch Was Concerning

The GPT-5 Launch Was Concerning 08 Aug, 2025 Bs in Blueberry There were screenshots of a classic LLM issue floating around Bluesky after the GPT-5 launch yesterday, and I asked GPT-5 myself to confirm. Sam Altman touted GPT-5 as a “PhD level expert in your pocket”, but this PhD doubled down on incorrectly answering the oldest trick for LLMs in the book. When GPT-4 launched, I (and many others) believed that GPT-5's launch would be the “AGI moment”. Cherry picking “bs in blueberry” as a fail

Why I ditched Google Chrome for Firefox Focus within 10 minutes of using the mobile browser

Jack Wallen / Elyse Betters Picaro / ZDNET ZDNET's key takeaways Firefox Focus is a security and privacy-focused mobile browser. This browser offers a minimal UI and maximum privacy features. Firefox Focus is available for both Android and iOS. I've run the gamut of web browsers on Android, and every time I think I've found "the one," I discover a reason not to use it. That reason might be a cluttered UI, a lack of options, or not enough security. Recently, however, I came across a browser

Black Hat 2025: Why your AI tools are becoming the next insider threat

Want smarter insights in your inbox? Sign up for our weekly newsletters to get only what matters to enterprise AI, data, and security leaders. Subscribe Now Cloud intrusions increased by 136% in the past six months. North Korean operatives infiltrated 320 companies using AI-generated identities. Scattered Spider now deploys ransomware in under 24 hours. However, at Black Hat 2025, the security industry demonstrated that it finally has an answer that works: agentic AI, delivering measurable resu

Encryption made for police and military radios may be easily cracked

Two years ago, researchers in the Netherlands discovered an intentional backdoor in an encryption algorithm baked into radios used by critical infrastructure–as well as police, intelligence agencies, and military forces around the world–that made any communication secured with the algorithm vulnerable to eavesdropping. When the researchers publicly disclosed the issue in 2023, the European Telecommunications Standards Institute (ETSI), which developed the algorithm, advised anyone using it for

Encryption Made for Police and Military Radios May Be Easily Cracked

Two years ago, researchers in the Netherlands discovered an intentional backdoor in an encryption algorithm baked into radios used by critical infrastructure–as well as police, intelligence agencies, and military forces around the world–that made any communication secured with the algorithm vulnerable to eavesdropping. When the researchers publicly disclosed the issue in 2023, the European Telecommunications Standards Institute (ETSI), which developed the algorithm, advised anyone using it for

Computing’s Top 30: Guowen Xu

Guowen Xu’s passion for cryptography was seeded in various courses throughout his undergraduate mathematics education. It was his experience as a doctoral student, however, that was truly transformative in terms of his learning how to navigate cryptographic security’s complexities and begin shaping his research directions and career. Today, Xu is a full professor in the School of Computer Science and Engineering at the University of Electronic Science and Technology of China, Chengdu. Xu’s wor

Herbie detects inaccurate expressions and finds more accurate replacements

Herbie improving accuracy on the “Hamming” benchmark suite. Longer arrows are better. Each arrow starts at the accuracy of the original expression, and ends at the accuracy of Herbie’s output, in each case on random double-precision inputs. Herbie Project News The Herbie Developers Herbie is developed at UW PLSE, with contributions from a supportive community. The main contributors are Pavel Panchekha, Alex Sanchez-Stern, David Thien, Zachary Tatlock, Jason Qiu, Jack Firth, and James R. Wilc

There's a Tea app for men, and it also has security problems

Tea bills itself as a safety dating app for women, allowing users to anonymously share details about men they have met. A new app called TeaOnHer has emerged that attempts to flip the script, with men sharing information about women they date. And while Tea drew scrutiny last month after a data breach revealed user information, including potentially identifying details such as phone numbers and personal anecdotes, the copycat app seems to be suffering from the same problem. TechCrunch discovere

Researchers hacked Google Gemini to take control of a smart home

Wired reported on new cybersecurity research that demonstrated a hack of the Google Gemini artificial intelligence assistant. The researchers were able to control connected smart home devices through the use of indirect prompt injections in Google Calendar invites. When a user requested a summary of their calendar and thanked Gemini for the results, the malicious prompt ordered Google's Home AI agent to take actions such as opening windows or turning lights off, as demonstrated in the video abov

'Freakier Friday' Review: Disney's Body-Swapping Sequel Really Rocks

For me, watching Freakier Friday -- the new sequel to the 2003 body-switch comedy starring Lindsay Lohan and Jamie Lee Curtis -- led to a change in perspective: I was now a fan of two Freaky Friday movies headlined by Lohan and Curtis. From Curtis' nostalgic and still-hilarious portrayal of waking up as a 15-year-old inhabiting her step-grandmother's body to entertaining scenes with a job-switching fortune teller (Saturday Night Live alum Vanessa Bayer), the sequel offers wacky and laugh-out-lo

Call of Duty and Battlefield 6 will both require Secure Boot on Windows

is a news editor covering technology, gaming, and more. He joined The Verge in 2019 after nearly two years at Techmeme. Posts from this author will be added to your daily email digest and your homepage feed. To better protect against cheaters, Activision says that Call of Duty: Black Ops 7 players on PC will need to use hardware with Trusted Platform Module (TPM) 2.0 and have Windows’ Secure Boot feature turned on when the game is available later this year. Ahead of that, Activision is doing

Anthropic ships automated security reviews for Claude Code as AI-generated vulnerabilities surge

Want smarter insights in your inbox? Sign up for our weekly newsletters to get only what matters to enterprise AI, data, and security leaders. Subscribe Now Anthropic launched automated security review capabilities for its Claude Code platform on Wednesday, introducing tools that can scan code for vulnerabilities and suggest fixes as artificial intelligence dramatically accelerates software development across the industry. The new features arrive as companies increasingly rely on AI to write c

Claude Code makes it easy to trigger a code check now with this simple command

Anthropic / Elyse Betters Picaro / ZDNET ZDNET's key takeaways Automated security reviews in Claude Code help ensure code safety. Spot and fix vulnerabilities before your code reaches production. Run the /security-review command in the terminal or via GitHub Action. Claude Code became generally available in May, and since then, it has become popular among developers for its coding assistance, available right in the terminal or integrated development environments (IDEs). Now, new features ar

Citizen Lab director warns cyber industry about US authoritarian descent

The director of Citizen Lab, one of the most prominent organizations investigating government spyware abuses, is sounding the alarm to the cybersecurity community and asking them to step up and join the fight against authoritarianism. On Wednesday, Ron Deibert will deliver a keynote at the Black Hat cybersecurity conference in Las Vegas, one of the largest gatherings of information security professionals of the year. Ahead of his talk, Deibert told TechCrunch that he plans to speak about what

Firefox Focus won me over in just 10 mins - why it's my new default mobile browser

Jack Wallen / Elyse Betters Picaro / ZDNET ZDNET's key takeaways Firefox Focus is a security and privacy-focused mobile browser. This browser offers a minimal UI and maximum privacy features. Firefox Focus is available for both Android and iOS. I've run the gamut of web browsers on Android, and every time I think I've found "the one," I discover a reason not to use it. That reason might be a cluttered UI, a lack of options, or not enough security. Recently, however, I came across a browser

The Best Apps for Managing Your Travel Expenses and Receipts

Work trips can be exhausting and full of small expenses that quickly add up. Between the Ubers to and from the airport, the snacks to keep up the energy, and the long dinners with clients, spending can quickly sprawl out of control. The last thing you want upon returning is to search through a voluminous pile of crumpled receipts only to find they’re not all there. WIRED and Condé Nast Traveler are here to help. Bringing together our expertise on software and travel, we picked a few of our favo

NASA explains how it keeps the Curiosity rover running, 13 years later

Thirteen years ago, the Curiosity rover landed on Mars, inside Gale crater in particular. It was originally sent to the red planet for a two-year mission, but it was extended indefinitely just a few months into its operations. The rover has several goals, most of which are meant to help scientists determine whether Mars could ever have supported life in the past. And while it's still very much operational and doing science, NASA has had to make adjustments and give it new capabilities to ensure

Best Home Security Cameras Without Subscriptions in 2025: Save on Safety

Does the camera have the ability to listen to audio and initiate a two-way conversation using the app? Does the camera have night vision that can cover the space you have in mind? Is the app easy to understand, control and use to change settings? Does the camera work with your existing home security system or your preferred voice assistant? Can video be stored without fees? Is it local storage under your control or cloud storage? Do you have to purchase your own storage device? Can you share

See 6 Planets Align in the Night Sky This August

On August 10, six planets—Mercury, Venus, Jupiter, Saturn, Uranus, and Neptune—will line up in an arc in the night sky. Four of these planets—Mercury, Venus, Jupiter, and Saturn—can be seen with the naked eye, while Uranus and Neptune will be visible through a very strong pair of skywatching binoculars or a backyard telescope. While August 10 marks the beginning of this planetary parade, these six planets will be visible until the final days of August, when Mercury sinks lower on the horizon an

Trend Micro warns of Apex One zero-day exploited in attacks

Trend Micro has warned customers to immediately secure their systems against an actively exploited remote code execution vulnerability in its Apex One endpoint security platform. Apex One is an endpoint security platform designed to automatically detect and respond to threats, including malicious tools, malware, and vulnerabilities. This critical security flaw (tracked as CVE-2025-54948 and CVE-2025-54987 depending on the CPU architecture) is due to a command injection weakness in the Apex One

ReVault flaws let hackers bypass Windows login on Dell laptops

ControlVault3 firmware vulnerabilities impacting over 100 Dell laptop models can allow attackers to bypass Windows login and install malware that persists across system reinstalls. Dell ControlVault is a hardware-based security solution that stores passwords, biometric data, and security codes within firmware on a dedicated daughterboard, known as the Unified Security Hub (USH). The five vulnerabilities, reported by Cisco's Talos security division and dubbed "ReVault," affect both the ControlV

Microsoft’s plan to fix the web with AI has already hit an embarrassing security flaw

is a senior editor and author of Notepad , who has been covering all things Microsoft, PC, and tech for over 20 years. Posts from this author will be added to your daily email digest and your homepage feed. Researchers have already found a critical vulnerability in the new NLWeb protocol Microsoft made a big deal about just just a few months ago at Build. It’s a protocol that’s supposed to be “HTML for the Agentic Web,” offering ChatGPT-like search to any website or app. Discovery of the embar

The first widespread cure for HIV could be in children

For years, Philip Goulder has been obsessed with a particularly captivating idea: In the hunt for an HIV cure, could children hold the answers? Starting in the mid-2010s, the University of Oxford pediatrician and immunologist began working with scientists in the South African province of KwaZulu-Natal, with the aim of tracking several hundred children who had acquired HIV from their mothers, either during pregnancy, childbirth, or breastfeeding. After putting the children on antiretroviral dru

Nvidia says its AI chips don't have a 'kill switch' after Chinese accusation

Nvidia on Tuesday rejected Chinese accusations that its data center GPUs for artificial intelligence include a hardware function that could remotely deactivate the chips, which is commonly called a "kill switch." "NVIDIA GPUs do not and should not have kill switches and backdoors," wrote Nvidia's Chief Security Officer David Reber in a blog post on Tuesday. The blog post comes after the Cyberspace Administration of China said last week that it needed Nvidia to provide documents about what it c

Axon jumps 16% after TASER maker tops results and boosts outlook on security needs

Axon Enterprise 's stock popped 16% after the TASER maker surpassed Wall Street's estimates and boosted its guidance due to robust demand for its security solutions. "Demand for new technology from our customers is accelerating, and it's outpacing even my most optimistic expectations," said CEO Rick Smith on an earnings call with analysts. "There's now one breakout product driving conversations. It's everything." The security solutions company also hiked guidance for the year, saying it now ex

Axon jumps 14% after TASER maker tops results and boosts outlook on security needs

Axon Enterprise 's stock popped 14% after the TASER maker surpassed Wall Street's estimates and boosted its guidance due to robust demand for its security solutions. "Demand for new technology from our customers is accelerating, and it's outpacing even my most optimistic expectations," said CEO Rick Smith on an earnings call with analysts. "There's now one breakout product driving conversations. It's everything." The security solutions company also hiked guidance for the year, saying it now ex

The Heat Wasn't Just Outside: Cyber Attacks Spiked in Summer 2025

Summer 2025 wasn't just hot; it was relentless. Ransomware hammered hospitals, retail giants suffered data breaches, insurance firms were hit by phishing, and nation-state actors launched disruptive campaigns. From stealthy PowerShell loaders to zero-day SharePoint exploits, attackers kept defenders on their heels. This report breaks down the season's most high-impact incidents and what security teams need to do before the next wave hits. Summer Expose Healthcare's Growing Ransomware Risk H

Knowing these 7 rules helped me optimize my home security camera for the best footage

Maria Diaz/ZDNET If you're a subscriber to the Nextdoor app, you've seen plenty of footage of prowling ne'er-do-wells caught in the eye of a video doorbell or home security camera. Hopefully, you don't have your own first-hand experience with suspicious characters milling around your front porch, or far worse. Also: Unplugging these 7 common household devices helped reduce my electricity bills For good reason, security cameras continue to grow in popularity, and we can expect them to become e