Latest Tech News

Stay updated with the latest in technology, AI, cybersecurity, and more

Filtered by: ack Clear Filter

Have a lot of stuff to track? My 5 favorite home inventory apps can help

HomePixel/iStock/Getty Images Plus Follow ZDNET: Add us as a preferred source on Google. I like to think I'm organized, but I could use a bit of help on this front, especially when it comes to keeping track of my things. For example, I have a large vinyl collection, and I couldn't tell you every album I own. However, with the help of a home inventory app, that task is considerably easier. With an inventory app, you can keep track of anything: food, clothing, tools, games, technology, kitchen

Something Extremely Strange Is Happening at the Event Horizon of This Supermassive Black Hole

In 2019, scientists unveiled the first-ever images of a black hole, M87*. Those observations kickstarted a wave of new investigations into how black holes work, how they grow, and how they change. And now, after a few upgrades, the Event Horizon Telescope network is back with another bombshell centered on M87*—finding tantalizing evidence of previously unknown physics at the event horizon of the black hole itself. In a series of images taken by the EHT between 2017 and 2021, scientists observed

Something Extremely Strange Is Happening at the Event Horizon of This Supermassive Blackhole

In 2019, scientists unveiled the first-ever images of a black hole, M87*. Those observations kickstarted a wave of new investigations into how black holes work, how they grow, and how they change. And now, after a few upgrades, the Event Horizon Telescope network is back with another bombshell centered on M87*—finding tantalizing of previously unknown physics at the event horizon of the black hole itself. In a series of images taken by the EHT between 2017 and 2021, scientists observed a comple

US government charges British teenager accused of at least 120 ‘Scattered Spider’ hacks

The U.S. Department of Justice on Thursday unsealed federal charges against British teenager Thalha Jubair, who prosecutors accuse of being involved in at least 120 cyberattacks, including the U.S. Courts system, and the extortion of dozens of U.S. companies. Jubair, 19, was arrested on Tuesday at his home in East London, according to a statement by the National Crime Agency. He appeared in court on Thursday morning in London alongside another teenager, Owen Flowers, 18. Both are accused of inv

SystemBC malware turns infected VPS systems into proxy highway

The operators of the SystemBC proxy botnet are hunting for vulnerable commercial virtual private servers (VPS) and maintain an average of 1,500 bots every day that provide a highway for malicious traffic. Compromised servers are located all over the world and have at least one unpatched critical vulnerability, some of them being plagued by tens of security issues. SystemBC has been around since at least 2019 and has been used by various threat actors, including several ransomware gangs, to del

How weak passwords and other failings led to catastrophic breach of Ascension

Last week, a prominent US senator called on the Federal Trade Commission to investigate Microsoft for cybersecurity negligence over the role it played last year in health giant Ascension's ransomware breach, which caused life-threatening disruptions at 140 hospitals and put the medical records of 5.6 million patients into the hands of the attackers. Lost in the focus on Microsoft was something as, or more, urgent: never-before-revealed details that now invite scrutiny of Ascension’s own security

Two teenagers charged over Transport for London cyber attack

Two teenagers charged over Transport for London cyber attack Two teenagers have been charged as part of a National Crime Agency (NCA) investigation into a cyber attack on Transport for London. TfL suffered a major hack on 31 August last year, which investigators believe was carried out by members of the cyber-criminal group, Scattered Spider. Thalha Jubair, 19, from east London, and Owen Flowers, 18, from Walsall in the West Midlands, were arrested at their home addresses on Tuesday by the NC

How to Back Up Your iPhone to iCloud, MacOS, or Windows (2025)

Your iPhone is so much more than just a screen for texting. Smartphones are how we get work done, stay on top of the crazy news cycle, rock out, keep in touch with friends and family, and capture life’s most important moments. Carrying all of that information in our pockets is incredibly powerful, and it makes getting through our days a little easier. It also means that your most important data can get lost when you forget your phone on the train or have an unfortunate spat with the sidewalk. I

I’d buy a BlackBerry reboot in 2025, but would you?

🗣️ This is an open thread. We want to hear from you! Share your thoughts in the comments and vote in the poll below — your take might be featured in a future roundup. Even though the original company is no longer with us, I believe there are two ways to remember the BlackBerry brand. Either you grimace while recalling the final struggle of uninspired Android devices. Or, you’re like me, and smile back at the 2010s and the brand’s heyday with glee. One of my first “smartphones” was a Curve 8320

Slack has raised our charges by $195k per year

For nearly 11 years, Hack Club - a nonprofit that provides coding education and community to teenagers worldwide - has used Slack as the tool for communication. We weren’t freeloaders. A few years ago, when Slack transitioned us from their free nonprofit plan to a $5,000/year arrangement, we happily paid. It was reasonable, and we valued the service they provided to our community. However, two days ago, Slack reached out to us and said that if we don’t agree to pay an extra $50k this week and $

Democrats are investigating Trump crypto advisor David Sacks over a possible SGE violation

Senator Elizabeth Warren (D-MA) and Representative Melanie Stansbury (D-N.M.) are leading a group of congressional Democrats in investigating White House Special Advisor David Sacks for possibly serving in his position for longer than he's allowed. Sacks, a former PayPal executive and venture capitalist at Craft Ventures, was originally picked by President Donald Trump to be the "White House A.I. & Crypto Czar" in 2024. "Any effort to stay beyond the time limits imposed on you as a Special Gove

Health Connect can now track your steps using your Android phone

Rita El Khoury / Android Authority TL;DR Google is officially adding native step tracking to Health Connect, as confirmed by Android 16 QPR2 Beta 2. The company announced the change today, and a new banner and “Devices” page within the app now explicitly state Health Connect will track your phone’s steps for other apps to use. This marks a significant shift for the platform, turning it from a simple data hub into a fitness tracking service. Last week, we reported that Google was bringing nat

Sen. Warren presses Trump AI and crypto czar Sacks on whether he's overstayed his job

U.S. President Donald Trump sits next to Crypto czar David Sacks at the White House Crypto Summit at the White House in Washington, D.C., U.S., March 7, 2025. What was meant to be a short-term assignment for venture capitalist David Sacks in President Donald Trump's White House appears to have stretched into something much bigger, according to leading Democratic lawmakers. Sen. Elizabeth Warren, D-Mass., and Rep. Melanie Stansbury, D-N.M., have teamed up with a number of other progressive poli

Scientists Detect Strange Signal in Gravitational Waves

For the first time, astrophysicists have measured the recoil — or "kick," in the parlance — resulting from the birth of a new black hole that formed from the merger of two preexisting ones. The international team of researchers measured the ripples in the fabric of spacetime, known as gravitational waves, allowing them to get unprecedented insights into the turbulent dynamics of two black holes crashing into each other. The team analyzed data collected by the Advanced LIGO and Virgo gravitatio

Tinycolor supply chain attack post-mortem

A malicious GitHub Actions workflow was pushed to a shared repo and exfiltrated a npm token with broad publish rights. The attacker then used that token to publish malicious versions of 20 packages, including @ctrl/tinycolor . My GitHub account, the @ctrl/tinycolor repository were not directly compromised. There was no phishing involved, and no malicious packages were installed on my machine and I already use pnpm to avoid unapproved postinstall scripts. There was no pull request involved becau

Garmin’s Venu 4 adds an LED flashlight and accessibility upgrades

is a senior reporter who’s been covering and reviewing the latest gadgets and tech since 2006, but has loved all things electronic since he was a kid. Posts from this author will be added to your daily email digest and your homepage feed. Garmin is launching its Venu 4 smartwatch today, expanding on the accessibility and sleep tracking features introduced with the Venu 3 two years ago. It’s available now in 41mm and 45mm models and starts at $549.99 which is $100 more expensive than the Venu 3

From ClickFix to MetaStealer: Dissecting Evolving Threat Actor Techniques

By John Hammond, Alden Schmidt, Lindsey Welch During the past fifteen business days, Huntress analysts have observed increased threat activity involving several notable techniques. One case involved a malicious AnyDesk installer, which initially mimicked a standard ClickFix attack through a fake Cloudflare verification page but then utilized Windows File Explorer and an MSI package masked as a PDF to deploy MetaStealer malware. Additionally, two incidents involving the Cephalus ransomware vari

Jack Black and Paul Rudd’s Meta ‘Anaconda’ Trailer Goes Full ‘Tropic Thunder’

Sony Pictures Entertainment finally released the official trailer for a new Anaconda remake, starring Paul Rudd and Jack Black, transforming the creature feature into a full-on comedy. The first time we heard of an Anaconda remake was last December. In it, Rudd and Black essentially gave us a vibe check that their remake of the film would lean heavily into the campy nature of the 1997 flick starring Jennifer Lopez, Ice Cube, and Jon Voight. Before that, all we knew about the plot was that it wo

VC firm Insight Partners says thousands of staff and limited partners had personal data stolen in a ransomware attack

Venture capital firm Insight Partners has notified thousands of people, including the firm’s limited partners, that their personal information was stolen by hackers in an earlier data breach. In a statement on September 4, the VC giant said it completed its review earlier in August following its data breach, which it described as a “social engineering attack” without further explanation. The venture firm has now said in a formal data breach notification filed with California’s attorney general

You absolutely should not buy Apple’s iPhone Air MagSafe battery pack

Apple released its thinnest phone yet last week, the iPhone Air, and revealed the new iPhone Air MagSafe Battery alongside it. The existence of a specially-made battery pack wasn’t a big surprise to me, because there had been rumors of the iPhone Air for months leading up to the event. Everyone was prepared for the thinnest iPhone ever to make some battery life sacrifices to achieve its svelte design. However, what was a surprise to me was how much Apple leaned on the new battery during the iPh

DataTables CDN Outage – post incident review

Outage - post incident review By Allan Jardine On 29th July 2025, the DataTables.net site had a major outage as a result of an attack. This took out the main site with its examples and documentation, the support forum, and the sub-domains, including, most importantly, the DataTables CDN. Digging into such an event, when something has gone so wrong, is not a fun thing to do, but it is important for me to do so I can learn what I can do better in future, for you so you can understand what happe

Google Ventures doubles down on dev tool startup Blacksmith just 4 months after its seed round

As speed becomes the defining currency in an AI-driven software world, Blacksmith has raised another round led by Google Ventures — just four months after its seed — to accelerate how code gets shipped. The $10 million Series A closed in just 14 days, with Google Ventures doubling down after first backing Blacksmith’s $3.5 million seed in May. At the time, Alphabet’s VC arm bet on the size of the market and the founding team, which included veterans of Cockroach Labs, another GV portfolio compa

Normal-order syntax-rules and proving the fix-point of call/cc

Normal-order direct-style beta-evaluator with syntax-rules, and the repeated applications of call/cc The presentation at the Workshop ``Daniel P. Friedman: A Celebration.'' December 4, 2004. Bloomington, IN Normal-order direct-style beta-evaluator with syntax-rules, and the repeated applications of call/cc Repeated applications of call/cc , formally , formally Normal-order direct-style beta-normalizer as syntax-rules Use (2) to prove (1) A few less common examples The title of the talk, i

Topics: cc cps lambda norm stack

CrowdStrike Infested With "Self-Replicating Worms"

A year after a glitch at cybersecurity company CrowdStrike triggered a global computer outage affecting millions of computers, the software vendor is being forced to contain a new threat: a swarm of self-replicating worms. As first reported by investigative cybersecurity journalist Brian Krebs, CrowdStrike once again became the launchpad for a potentially debilitating security hazard when some 25 code packages were compromised by a novel strand of malware. Dubbed "Shai-Hulud," the malicious so

HackEthix 2025: Training Kerala’s Next Generation of Cyber Defenders

The IEEE Student Branch of Mohandas College of Engineering and Technology (MCET) brought the tech community together with HackEthix 2025. The July 19, 2025, event at the MCET campus in Trivandrum was Kerala’s largest one-day cybersecurity workshop championed by the Computer Society Chapter Grant Initiative. It’s a crucial first step in training and equipping the next generation of cyber professionals. Cybersecurity already faces a talent shortage and skills gap. Global security job vacancies gr

This popular Android Auto feature might be coming back - here's why

ZDNET | Charlie Osborne Follow ZDNET: Add us as a preferred source on Google. ZDNET's key takeaways Google appears to be reverting to an older Android Auto display. A recent upgrade to Material You changed the background colors. A recent beta version shows code that gives users a choice. Android Auto is scrapping a controversial feature. Last month, the Android in-car infotainment system rolled out a small change -- an update to the Material You design. The upgrade didn't add or take away

Shai-Hulud malware attack: Tinycolor and over 40 NPM packages compromised

Executive Summary The NPM ecosystem is facing another critical supply chain attack. The popular @ctrl/tinycolor package, which receives over 2 million weekly downloads, has been compromised along with more than 40 other packages across multiple maintainers. This attack demonstrates a concerning evolution in supply chain threats - the malware includes a self-propagating mechanism that automatically infects downstream packages, creating a cascading compromise across the ecosystem. The compromised

Live Updates: Shai-Hulud, the Most Dangerous NPM Breach in History

We are tracking the largest and most dangerous npm supply-chain compromise in history, known as the Shai-Hulud malware campaign, which has now impacted hundreds of packages across multiple maintainers. This includes popular libraries such as @ctrl/tinycolor as well as packages maintained by CrowdStrike. Malicious versions embed a trojanized script (bundle.js) designed to steal developer credentials, exfiltrate secrets, and persist in repositories and endpoints through automated workflows. The ta

Writing an operating system kernel from scratch – RISC-V/OpenSBI/Zig

Posted on: September 13, 2025 | at 09:30 AM Follow @popovicu94 I recently implemented a minimal proof of concept time-sharing operating system kernel on RISC-V. In this post, I’ll share the details of how this prototype works. The target audience is anyone looking to understand low-level system software, drivers, system calls, etc., and I hope this will be especially useful to students of system software and computer architecture. This is a redo of an exercise I did for my undergraduate cours