Latest Tech News

Stay updated with the latest in technology, AI, cybersecurity, and more

Filtered by: _________ Clear Filter

Foldable phones are thin and light in 2025, so why are these brands bending the truth?

Paul Jones / Android Authority TL;DR A Twitter user has shown that the Galaxy Z Fold 7 is thinner than the HONOR Magic V5. It turns out both HONOR and OPPO measure their foldables without the protective inner screen film. A closer look at product pages also reveals that some brands don’t include these layers when weighing their foldables. HONOR launched the Magic V5 in China earlier this month, and the company claimed that the white version was the world’s thinnest foldable phone at 8.8mm. H

Here’s how Apple Intelligence keeps privacy in mind versus the competition

Artificial intelligence has obviously been the industry craze for the past couple years. While large language models are incredibly capable, they’ve always come with a bit of a compromise: privacy. Ultimately, you’re still using a model hosted in the cloud, and all of your conversations are stored on some server. Apple’s always had privacy at the core of its products – so in the months leading up to the debut of Apple’s AI features, many people wondered: how would Apple handle it? Today, we del

Apple's next iPad Pro will reportedly get two front-facing cameras

The iPad Pro with the M5 chip is expected to be just as easy to use for selfies in a landscape or portrait orientation. According to Bloomberg's Mark Gurman, Apple will add a second front-facing camera on the portrait edge of the upcoming iPad Pro that's expected to launch later this year. It may seem like a small quality-of-life upgrade, but it means the iPad Pro can use either camera to center the subject for selfies or FaceTime calls. Compared to the previous iPad models, the upcoming iPad P

The best Android phones for 2025

Read our full Google Pixel 9 Pro and Pixel 9 Pro XL review Processor: Google Tensor G4 | Display: 6.3-inch Super Actua, up to 120Hz | Cameras: Rear array (50MP wide, 48MP ultrawide with Macro Focus, 48MP 5x telephoto lens), 42MP dual PD selfie front camera with autofocus | Battery: 4,700mAh Finally, a smaller Pixel Pro. Google's Pixel series has long been one of the best Android phones around, with the Pro model being the superior version. But it was always a little too big and too cumbersome

Microsoft releases emergency patches for SharePoint RCE flaws exploited in attacks

Microsoft has released emergency SharePoint security updates for two zero-day vulnerabilities tracked as CVE-2025-53770 and CVE-2025-53771 that have compromised services worldwide in "ToolShell" attacks. In May, during the Berlin Pwn2Own hacking contest, researchers exploited a zero-day vulnerability chain called "ToolShell," which enabled them to achieve remote code execution in Microsoft SharePoint. These flaws were fixed as part of the July Patch Tuesday updates; However, threat actors were

5 tips for building foundation models for AI

imaginima/Getty Many businesses are just beginning to grapple with the impact of artificial intelligence, but some have been using machine learning (ML) and other emerging technologies for over a decade. Also: Most AI projects are abandoned - 5 ways to ensure your data efforts succeed For Manish Jethwa, CTO at Ordnance Survey (OS), the UK's national mapping service, the priority is to combine his organization's AI and ML experiences with recent advances in generative AI to refine, distribute,

Topics: ai data models os said

I still prefer my Google Pixel 9 Pro over the expensive flagships - and it's not even close

Adam Breeden/ZDNET Last year, I was emphatic that my time with Pixel phones was over because Google had announced it was planning to inject even more AI "goodness" into Android. I saw that as an opportunity to jump ship. My goal was to buy the Nothing Phone 3. Then, as fate would have it, Nothing CEO Carl Pei announced that his company was going all-in on AI, and the next Nothing Phone would leverage the technology in ways no other device had. Foiled again. Also: This hidden Pixel camera set

JOVE – Jonathan’s Own Version of Emacs

########################################################################## # This program is Copyright (C) 1986-2002 by Jonathan Payne. JOVE is # # provided by Jonathan and Jovehacks without charge and without # # warranty. You may copy, modify, and/or distribute JOVE, provided that # # this notice is included in all the source files and documentation. # ########################################################################## [Updated in 2023 Nov] JOVE on UNIX/Linux/MacOS X/*BSD/CygWin Systems

Digital vassals? French Government ‘exposes citizens’ data to US'

France’s deepening reliance on US tech giants is raising alarms about digital sovereignty and exposing public data to foreign jurisdictions. In a French Senate report on economic and digital sovereignty, Senators accused the French State of “political fault”. That was in regard to outsourcing essential data infrastructure to US companies subject to US extraterritorial laws, including Microsoft, despite repeated warnings and alternatives. “France is subject to US extraterritorial law,” the repo

Subreply – An open source text-only social network

To see all available qualifiers, see our documentation . Saved searches Use saved searches to filter your results more quickly We read every piece of feedback, and take your input very seriously. You signed in with another tab or window. Reload to refresh your session. You signed out in another tab or window. Reload to refresh your session. You switched accounts on another tab or window. Reload to refresh your session. Dismiss alert

What birdsong and back ends can teach us about magic

Teller describes the underlying principle like so: “Sometimes magic is just someone spending more time on something than anyone else might reasonably expect.” Allen Pike: An Unreasonable Amount of Time And if you look at it from the other direction, that means that you - yes, you personally 🫵 - have the opportunity to produce magical experiences without any “secret sauce” beyond your willingness to put in the work. But it might not come easily. Progress Everyone who writes code goes through t

What my mother didn’t talk about (2020)

We did not visit Poland often. Only when someone died. I have not been able to bring part of my mother’s ashes to Poland yet because of the pandemic. They sit in my living room, waiting to join my other dead relatives in her village of Bedoń. I live in California, 3,000 miles away from where I grew up, and when my mother couldn’t sleep she’d call me. I always picked up. “I think I know how I got sick,” she said once. My mother had an aversion to being sick and to anyone knowing about it. Her

SIOF (Scheme in One File) – A Minimal R7RS Scheme System

SIOF (Scheme In One File) - A Minimal R7RS Scheme System SIOF is a portable interpreter for the R7RS Scheme programming language. It can be built from a single C source file siof.c; there are no OS- or hardware-specific parts, no compiler-specific tricks, no dependency on platform-specific building tools. There is no distributives or packages: just compile the source file with your favorite C compiler, link it with the standard C runtime libraries and be done with it. For some platforms, precom

How slow motion became cinema’s dominant special effect

About 20 years ago, a neuroscientist named David Eagleman strapped a bunch of students into harnesses, hoisted them to the top of an imposing metal tower, and then, without warning, dropped them 150 feet. Though the students landed safely in nets, the experience was—by design—terrifying. Eagleton wanted to simulate the feeling of plummeting to one’s death. His goal was to figure out why survivors of near-death experiences almost always said the same thing: “It felt like the world was going in sl

Stdio(3) change: FILE is now opaque

Contributed by rueda on 2025-07-17 from the more-opacity,-igor dept. In -current , the struct underlying stdio(3) 's FILE type has been made opaque, with library versions bumps across the board: CVSROOT: /cvs Module name: src Changes by: [email protected] 2025/07/16 09:33:05 Modified files: lib/libc : Symbols.list shlib_version lib/libc/hidden: stdio.h wchar.h lib/libc/stdio : Makefile.inc fclose.3 fclose.c findfp.c lib/libcrypto : shlib_version lib/libcurses : shlib_version lib/libedit

Simulating hand-drawn motion with SVG filters

Published on July 09, 2025 Ever wondered how cartoons create that hand-drawn “jitter” effect? I recently watched an ARTE documentary about Neapolitan pizza and was fascinated by the animated illustrations (drawn in simple shapes and plain colors) that accompanied the segment where the recipe and its ingredients were presented. The illustrations were static, but they had a subtle animation effect that made them look like they were moving slightly. See for example in this short clip, where you c

Using the Matrix Cores of AMD RDNA 4 architecture GPUs

AMD RDNA 4 architecture GPUs AMD RDNA™ 4 architecture GPUs, which have 3rd-generation Matrix Cores, improved the performance of Generalized Matrix Multiplication (GEMM) operations. The table below compares theoretical FLOPS/clock/CU (floating point operations per clock, per compute unit) to previous generations. However, we changed the VGPR layout for the arguments of Wave Matrix Multiply Accumulate (WMMA) operations compared to the previous RDNA 3 generation [1]. Therefore, it does not have ba

Topics: 16 ele matrix rdna wmma

Debugging Bash Like a Sire

Many engineers have a strained relationship with Bash. I love it though, but I’m very aware of it’s limitations when it comes to error handling and data structures (or lack thereof). As a result of these limitations I often see Bash scripts written very defensively that define something like: set -euxo pipefail These are bash builtin options that do more or less sensible things. e: Exit immediately when a non-zero exit status is encountered u: Undefined variables throws an error and exits t

Agents built from alloys

This spring, we had a simple and, to my knowledge, novel idea that turned out to dramatically boost the performance of our vulnerability detection agents at XBOW. On fixed benchmarks and with a constrained number of iterations, we saw success rates rise from 25% to 40%, and then soon after to 55%. The principles behind this idea are not limited to cybersecurity. They apply to a large class of agentic AI setups. Let me share. XBOW’s Challenge XBOW is an autonomous pentester. You point it at yo

Log by time, not by count

Log by Time, not by Count July 20, 2025 "How to Log" is a surprisingly deep topic in software engineering with many different viewpoints, and they're almost all valid in different situations. I'm going to argue that when processing lots of events, it's best to log every X seconds, rather than every X messages. This is a simple concept, but I've never seen it written down before. Let's quickly look at some pseudocode to understand what I mean. Count-based logging num_events_processed = 0 whi

ESP32-Faikin: ESP32 based module to control Daikin aircon units

Everyone knows Daikin make some of the best air conditioners out there, mechanically speaking. Sadly their WiFi control modules are not so good, especially the latest models which are all cloud based, require an internet connection to even work, and are slow. This code/module provides local control via web interface, MQTT, and HomeAssistant integration, all with no cloud crap. There is also a new Faikin Remote Control available, BLE linked to the Faikin, with environmental sensors, available o

Show HN: X11 desktop widget that shows location of your network peers on a map

connmap connmap is an X11 desktop widget that shows location of your current network peers on a world map. (Works on Wayland as well!) Installation Clone the repository git clone https://github.com/h2337/connmap --depth 1 , install the dependencies (see below), run make install , then run the resulting executable ./connmap.elf . If you want to run it without attaching it to the terminal then add ampersand at the end of the command: ./connmal.elf & . You can also add it to your i3wm config t

The Daily Life of a Medieval King

Have you wondered what a medieval king did on a typical day? Thanks to Christine de Pizan, we have an account of what daily life was like for King Charles V of France. Around the year 1404, Christine de Pizan completed her work, Livre des faits et bonnes mœurs du sage roy Charles V. It was both a biography of the French king who reigned from 1364 to 1380 and a guide to how an ideal monarch should live and rule. Christine had a good vantage point to tell this story. Her father, Tommaso di Pizan

“Dynamic Programming” is not referring to “computer programming”

When seeing the phrase “dynamic programming” in an algorithms class or leetcode study guide, the first question people ask is “what does ‘dynamic’ mean in this context?”. The key question is instead “what does ‘programming’ mean in this context?”, because it does not mean “computer programming”. Instead it refers to, as the Oxford English Dictionary puts it, programming. n. 4. Planning carried out for purposes of control, management, or administration. So really, it’s closer to “TV programmi

How to handle people dismissing io_uring as insecure?

To see all available qualifiers, see our documentation . Saved searches Use saved searches to filter your results more quickly We read every piece of feedback, and take your input very seriously. You signed in with another tab or window. Reload to refresh your session. You signed out in another tab or window. Reload to refresh your session. You switched accounts on another tab or window. Reload to refresh your session. Dismiss alert

‘Mortal Kombat II’ Is Ready to Be a Bigger, Better Sequel

Now that the first trailer for Mortal Kombat II dropped earlier this week, director Simon McQuoid’s free to talk about how this follow-up builds on the 2021 reboot. Talking to IGN, McQuoid opened up on ensuring the second movie delivered on the promise of the first movie, namely having the real fighting tournament that features franchise characters beating the hell out of each other. Said characters include the returning Sonya Blade, Raiden, and Liu Kang, and the newly introduced Kitana, Shao K

X-Men at 25 is more relevant than ever

Credit: 20th Century Studios There's much to love about this film, including plenty of memorable standout scenes; seven of our favorites are featured below. It's got stellar casting, snappy dialogue, and breaks up the action with quieter character moment that advance the story without slowing the pace. X-Men also takes pains to establish key relationships: Charles and Magneto, Rogue and Wolverine, and the romantic triangle of Jean, Cyclops, and Wolverine. We care about these characters: their i

The frenzied, gamified chase for Labubus

On Thursday night, I toggled endlessly between a TikTok Live stream and a shopping app in anticipation of 9:30PM. For 30 minutes, I hunted for an available listing; many expletives were uttered. I exhibited bot behavior and got iced out of the app multiple times. I tapped so many times my thumbs got sore. This is Labubu drop night. Something that’s lost in the Labubu mania is that actually buying one from the source is, in one word, maddening. There are, of course, countless fake options (“Lafu

These are our favorite cyber books on hacking, espionage, crypto, surveillance, and more

In the last 30 years or so, cybersecurity has gone from being a niche specialty within the larger field of computer science, to an industry estimated to be worth more than $170 billion made of a globe-spanning community of hackers. In turn, the industry’s growth, and high-profile hacks such as the 2015 Sony breach, the 2016 U.S. election hack and leak operations, the Colonial Pipeline ransomware attack, and a seemingly endless list of Chinese government hacks, have made cybersecurity and hacking