Latest Tech News

Stay updated with the latest in technology, AI, cybersecurity, and more

Filtered by: cur Clear Filter

C10kday

From March 20, 1998 when the first curl release was published, to this day August 5, 2025 is exactly 10,000 days. We call it the curl-10000-day. Or just c10kday. c ten K day. We want to celebrate this occasion by collecting and sharing stories. Your stories about curl. Your favorite memories. When you used curl for the first time. When curl saved your situation. When curl rescued your lost puppy. What curl has meant or perhaps still means to you, your work, your business, or your life. We want

Chris Curry interviewed by Your Computer magazine (1981)

from the October 1981 issue of Your Computer magazine Chris Curry's Cambridge company, Acorn, is beginning to emerge as one of the strongest personal computer firms in Britain. Its main product, the Acorn Atom, has proved both popular and reliable. The company won the coveted contract to design and build the computer to be marketed by the BBC and accompany the BBC's planned computer literacy series. Chris Curry talks to Duncan Scot. -------- The ATOM computer is one of the few approved by the

SonicWall urges customers to disable SSLVPN amid reports of ransomware attacks

Enterprise security company SonicWall is urging its customers to disable a core feature of its most recent line-up of firewall devices after security researchers reported an uptick in ransomware incidents targeting SonicWall customers. In a statement this week, SonicWall said it had observed a “notable increase” of security incidents targeting its Generation 7 firewalls where customers have its VPN enabled. The company said it is “actively investigating these incidents to determine whether they

Microsoft increases Zero Day Quest prize pool to $5 million

Microsoft will offer up to $5 million in bounty awards at this year's Zero Day Quest hacking contest, which the company describes as the "largest hacking event in history." Last year's Zero Day Quest has also generated significant participation from the security community, following Microsoft's offer of $4 million in rewards for vulnerabilities in cloud and AI products and platforms. After the November hacking competition concluded, Microsoft announced that it had paid $1.6 million, having rece

Android gets patches for Qualcomm flaws exploited in attacks

Google has released security patches for six vulnerabilities in Android's August 2025 security update, including two Qualcomm flaws exploited in targeted attacks. The two security bugs, tracked as CVE-2025-21479 and CVE-2025-27038, were reported through the Google Android Security team in late January 2025. The first is a Graphics framework incorrect authorization weakness that can lead to memory corruption due to unauthorized command execution in the GPU micronode while executing a specific s

EconTeen – Financial literacy lessons and tools for teens

We've reimagined financial education for the digital generation. Our comprehensive curriculum combines proven teaching methods with engaging technology to deliver real results. 💡 Interactive Learning Engaging lessons with quizzes, scenarios, and hands-on activities that make complex financial concepts easy to understand and remember. 🎓 Comprehensive Curriculum From budgeting basics to investment strategies, our 22+ lesson modules cover everything students need for lifelong financial success.

EconTeen – Financial Literacy Lessons and Tools for Teens

We've reimagined financial education for the digital generation. Our comprehensive curriculum combines proven teaching methods with engaging technology to deliver real results. 💡 Interactive Learning Engaging lessons with quizzes, scenarios, and hands-on activities that make complex financial concepts easy to understand and remember. 🎓 Comprehensive Curriculum From budgeting basics to investment strategies, our 22+ lesson modules cover everything students need for lifelong financial success.

NASA's Curiosity picks up new skills

Instead, Curiosity and its younger sibling Perseverance each use their MMRTG nuclear power source, which relies on decaying plutonium pellets to create energy and recharge the rover’s batteries. Providing ample power for the rovers’ many science instruments, MMRTGs are known for their longevity (the twin Voyager spacecraft have relied on RTGs since 1977). But as the plutonium decays over time, it takes longer to recharge Curiosity’s batteries, leaving less energy for science each day. The team

Battlefield 6 anti-cheat system requires Secure Boot, shutting out Linux and legacy PCs

In a nutshell: Electronic Arts is preparing to launch the next chapter in the Battlefield saga and expects players to fully embrace the new FPS experience. However, many potential buyers may be disappointed by the game's lack of support for Linux-based platforms. Battlefield 6 will include a powerful anti-cheat system that requires players to enable Secure Boot on their Windows PCs. Battlefield Wire confirmed the news on X, stating that EA's anti-cheat technology will run at the kernel level on

These protocols will help AI agents navigate our messy lives

What should these protocols say about security? Researchers and developers still don’t really understand how AI models work, and new vulnerabilities are being discovered all the time. For chatbot-style AI applications, malicious attacks can cause models to do all sorts of bad things, including regurgitating training data and spouting slurs. But for AI agents, which interact with the world on someone’s behalf, the possibilities are far riskier. For example, one AI agent, made to read and send e

Ransomware gangs join attacks targeting Microsoft SharePoint servers

Ransomware gangs have recently joined ongoing attacks targeting a Microsoft SharePoint vulnerability chain, part of a broader exploitation campaign that has already led to the breach of at least 148 organizations worldwide. Security researchers at Palo Alto Networks' Unit 42 have discovered a 4L4MD4R ransomware variant, based on open-source Mauri870 code, while analyzing incidents involving this SharePoint exploit chain (dubbed "ToolShell"). The ransomware was detected on July 27 after discove

These are the best streaming services you aren’t watching

We all know how to find our favorite shows and blockbuster films on mainstream streaming services like Netflix, HBO Max, and Disney+. But even as streaming has opened the door to millions of hours of on-demand entertainment, it can still feel like there’s nothing fresh or exciting to watch anymore. If you agree, it’s time to check out some of the more niche streaming services available, where you can find remarkable content unlikely to be available elsewhere. This article breaks down the best

12 Best Outdoor Security Cameras (2025): Battery-Powered, LTE, No Subscription

Compare These Security Cameras Best MicroSD Cards Photograph: Amazon Some security cameras support local storage, enabling you to record videos on the camera or a linked hub. A few hubs have built-in storage, and some provide slots for hard drives, but most rely on microSD cards. This is a quick guide on what to look for (plus some recommendations). The microSD card you choose should have fast read and write speeds so you can record high-quality video and play it back without delay. I recomm

Best Home Security Systems in 2025: Safeguard Your Home With These Top Options

SimpliSafe home security systems can be easily tailored to your needs. Just add or subtract hardware and equipment as you please. CNET When choosing a home security system for your home, you may be tempted to start by deciding between a DIY setup or professionally installed systems with monitoring services. Remember to make your decision after considering the equipment, installation, monitoring options and other features you want. Here are some bits of information to keep in mind about these pa

Five children see HIV viral loads vanish after taking antiretroviral drugs

For years, Philip Goulder has been obsessed with a particularly captivating idea: In the hunt for an HIV cure, could children hold the answers? Starting in the mid-2010s, the University of Oxford pediatrician and immunologist began working with scientists in the South African province of KwaZulu-Natal, with the aim of tracking several hundred children who had acquired HIV from their mothers, either during pregnancy, childbirth, or breastfeeding. After putting the children on antiretroviral dru

Palo Alto Networks agrees to buy CyberArk for $25B

In Brief Cybersecurity giant Palo Alto Networks announced on Wednesday its intent to acquire identity management and security company CyberArk for $25 billion. The deal, a mix of cash and stock, marks Palo Alto’s entrance into the identity security space, according to a company press release. Palo Alto has been on a shopping spree since Nikesh Arora took over as CEO and chairman of the company in 2018, according to the Financial Times, which estimated the company has spent more than $7 billion

The First Widespread Cure for HIV Could Be in Children

For years, Philip Goulder has been obsessed with a particularly captivating idea: In the hunt for an HIV cure, could children hold the answers? Starting in the mid-2010s, the University of Oxford pediatrician and immunologist began working with scientists in the South African province of KwaZulu-Natal, with the aim of tracking several hundred children who had acquired HIV from their mothers, either during pregnancy, childbirth, or breastfeeding. After putting the children on antiretroviral dru

Google Will Use AI to Guess People’s Ages Based on Search History

Last week, the United Kingdom began requiring residents to verify their ages before accessing online pornography and other adult content, all in the name of protecting children. Almost immediately, things did not go as planned—although, they did go as expected. As experts predicted, UK residents began downloading virtual private networks (VPNs) en masse, allowing them to circumvent age verification, which can require users to upload their government IDs, by making it look like they’re in a diff

Yes, You Can Bundle Other Cybersecurity Services With Some VPNs. But Is It a Good Idea?

If all you’re using to protect your digital privacy and security is a VPN and your own vigilance, you’re still leaving yourself vulnerable to various online threats like phishing, malware, identity theft and ransomware. To fully protect yourself, you need to start putting together an arsenal of privacy and security tools. Using a trustworthy VPN is a great start because a VPN can boost your online privacy by encrypting your internet traffic and masking your true IP address. But a VPN is only on

Supporting the BEAM community with free CI/CD security audits

Keep up to date with the latest news, best practice ideas and exclusive offers. Don’t miss out. Sign up here. Sign up for our quarterly newsletter At Erlang Solutions, our support for the BEAM community is long-standing and built into everything we do. From contributing to open-source tools and sponsoring events to improving security and shaping ecosystem standards, we’re proud to play an active role in helping the BEAM ecosystem grow and thrive. One way we’re putting that support into action

AI-powered Cursor IDE vulnerable to prompt-injection attacks

A vulnerability that researchers call CurXecute is present in almost all versions of the AI-powered code editor Cursor, and can be exploited to execute remote code with developer privileges. The security issue is now identified as CVE-2025-54135 and can be leveraged by feeding the AI agent a malicious prompt to trigger attacker-control commands. The Cursor integrated development environment (IDE) relies on AI agents to help developers code faster and more efficiently, allowing them to connect

The First Widespread Cure for HIV Could Be in Children

For years, Philip Goulder has been obsessed with a particularly captivating idea: In the hunt for an HIV cure, could children hold the answers? Starting in the mid-2010s, the University of Oxford pediatrician and immunologist began working with scientists in the South African province of KwaZulu-Natal, with the aim of tracking several hundred children who had acquired HIV from their mothers, either during pregnancy, childbirth, or breastfeeding. After putting the children on antiretroviral dru

AC or DC: Which Is Better?

As the story goes, the rock band AC/DC took its name from a label on an old sewing machine in the Young brothers’ home. It must have meant that the machine could run on either alternating-current or direct-current electricity. Today, all the newfangled electronic devices in our homes run only on DC power—even lighting fixtures, now that LEDs have replaced incandescent bulbs. But wait. The electricity that comes out of your wall socket is alternating current. That means each device needs to conv

Proposed "Click to Cancel" Act tackles subscription traps with clearer cancellation rules (again)

What just happened? A court decision temporarily halted the rollout of the FTC's click-to-cancel rule last month, but the drive for greater transparency and simplicity for consumers navigating the subscription economy remains strong. State-level regulations on automatic renewals are still in effect in areas such as California and New York, and now federal lawmakers are once again turning their attention to this issue. Democratic lawmakers have introduced the Click to Cancel Act, a bill designed

Understanding the Complete Identity Management Ecosystem

Confused by the growing identity management landscape? This comprehensive guide breaks down every IAM category—from traditional workforce identity to emerging AI agents. Learn how CIAM, PAM, Zero Trust, and 15+ other solutions connect in the modern security ecosystem. 🔐 Identity management has grown from simple password systems into a complex web of specialized tools and technologies. Each piece serves a specific purpose, but understanding how they all fit together can be confusing. This guide

SEC debuts 'Project Crypto' to bring U.S. financial markets 'on chain'

The Securities and Exchange Commission on Thursday debuted "Project Crypto," an initiative to modernize securities rules and regulations to allow for crypto-based trading. "To achieve President Trump's vision of making America the crypto capital of the world, the SEC must holistically consider the potential benefits and risks of moving our markets from an off-chain environment to an on-chain one," SEC chair Paul Atkins said in remarks to an "American Leadership in the Digital Finance Revolution

Read This Before You Trust Any AI-Written Code

We are in the era of vibe coding, allowing artificial intelligence models to generate code based on a developer’s prompt. Unfortunately, under the hood, the vibes are bad. According to a recent report published by data security firm Veracode, about half of all AI-generated code contains security flaws. Veracode tasked over 100 different large language models with completing 80 separate coding tasks, from using different coding languages to building different types of applications. Per the repor

CISA open-sources Thorium platform for malware, forensic analysis

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) today announced the public availability of Thorium, an open-source platform for malware and forensic analysts across the government, public, and private sectors. Thorium was developed in partnership with Sandia National Laboratories as a scalable cybersecurity suite that automates many tasks involved in cyberattack investigations, and can schedule over 1,700 jobs per second and ingest over 10 million files per hour per permission

Launch HN: Gecko Security (YC F24) – AI That Finds Vulnerabilities in Code

Hey HN, I'm JJ, Co-Founder of Gecko Security ( https://www.gecko.security ). We're building a new kind of static analysis tool that uses LLMs to find complex business logic and multi-step vulnerabilities that current scanners miss. We’ve used it to find 30+ CVEs in projects like Ollama, Gradio, and Ragflow ( https://www.gecko.security/research ). You can try it yourself on any OSS repo at ( https://app.gecko.security ). Anyone who’s used SAST (Static Application Security Testing) tools knows th

Two critical Android 16 security features you're not using (but absolutely should)

JEFF PACHOUD/Getty Images Although Google's earlier-than-expected release of Android 16 was missing a few important features, the updated OS does deliver improved security that every Android user would be well-advised to enable. I'll explain these two key security features and how to find and enable them. Also: How to clear your Android phone cache (and why it greatly improves performance) 1. Identity Check This feature was added in 2024, but it didn't receive much attention until the relea