Latest Tech News

Stay updated with the latest in technology, AI, cybersecurity, and more

Filtered by: cur Clear Filter

You should update your Samsung phone ASAP - this zero-day flaw just got patched

Kerry Wan/ZDNET Follow ZDNET: Add us as a preferred source on Google. ZDNET's key takeaways Samsung issued a patch for a zero-day vulnerability. Android devices are affected by ongoing attacks in the wild. Samsung users should accept security updates immediately. Samsung recently issued a patch to resolve a critical vulnerability impacting its Android smartphone users. All impacted phone models will receive the fix, which patches a vulnerability tracked as CVE-2025-21043. The security fla

Verge readers can get 20 percent off Nanoleaf wall lights

Posts from this author will be added to your daily email digest and your homepage feed. If you want a fun way to add light and color to your space, Nanoleaf’s wall lights are a great option. Ahead of Prime Big Deal Days, Nanoleaf is offering 20 percent off select products exclusively for Verge readers with the promo code THEVERGE20OFF through September 20th. For instance, you can save 20 percent off Nanoleaf’s Blocks Squares Smarter Kit, dropping the price down to $144 ($36 off). This is curren

CERN Animal Shelter for Computer Mice (2011)

"Stop — Think — Click"... ...is the basic recommendation for securely browsing the Internet and for securely reading emails. Users who have followed this recommendation in the past were less likely to have their computer infected or their computing account compromised. However, still too many users click on malicious web-links, and put their computer and account at risk.

This Microsoft Entra ID Vulnerability Could Have Been Catastrophic

As businesses around the world have shifted their digital infrastructure over the last decade from self-hosted servers to the cloud, they’ve benefitted from the standardized, built-in security features of major cloud providers like Microsoft. But with so much riding on these systems, there can be potentially disastrous consequences at a massive scale if something goes wrong. Case in point: Security researcher Dirk-jan Mollema recently stumbled upon a pair of vulnerabilities in Microsoft Azure’s

Target-rich environment: Why Microsoft 365 has become the biggest risk

Microsoft 365 has become the central nervous system of modern business — and cybercriminals know it. Just as Windows became the primary target for attackers because of its market dominance in the 1990s and 2000s, Microsoft 365 now finds itself in the crosshairs for having "won" the email and collaboration war. With over 400 million paid Office 365 seats worldwide and countless organizations relying on its integrated suite of applications, Microsoft 365 represents the ultimate target-rich envir

Can Police Take Your Home Security Videos? 3 Ways It's Legal

Home security cameras and video doorbells provide many ways to protect privacy, from end-to-end encryption to the ability to use local video storage instead of storing on the cloud. But when the cops get involved, it's another story. Law enforcement has several options to take home security videos that you've recorded. That can include videos held in the cloud by your security company and even videos you may be keeping in a local hub that you own. It's important to know your rights, know when t

Political Influencers Are Ramping Up Security—and Posting Through It

As news broke that conservative activist Charlie Kirk was shot at an event on a college campus last week, Hasan Piker’s Twitch chat was spiraling. Messages flooded onto the streamer’s channel. “Disavow quickly and vehemently for your own safety,” one chatter urged. “Pleeeeeeaaaase don’t do public debates anymore,” begged another. Piker, one of the most prominent progressive creators online, was set to face Kirk in a live debate at Dartmouth University on September 25. Now, still on air with new

Computing’s Top 30: Kelly Onu

In addition to her stellar work to ensure application and cloud security for clients across industries, Kelly Onu works to secure technology’s future by mentoring ambitious students and young professionals from all walks of life. Onu’s own experiences as a mentee helped her to sharpen her technical expertise, navigate challenges, and develop as a leader. Today, she pays those benefits forward through active involvement in organizations such as IEEE, Women in Security and Privacy, and the Inter

CERN Animal Shelter for Computer Mice

"Stop — Think — Click"... ...is the basic recommendation for securely browsing the Internet and for securely reading emails. Users who have followed this recommendation in the past were less likely to have their computer infected or their computing account compromised. However, still too many users click on malicious web-links, and put their computer and account at risk.

Microsoft Offers Free Windows 10 Extended Security Updates: Here's What to Do

Microsoft is sunsetting Windows 10 support on Oct. 14, and stopping all updates to the OS. If you aren't able to update to Windows 11, you still have options. For $30 you can grab a year of extended-security updates. There is also a free option available, provided you're willing to enable cloud backup and connect it to your OneDrive account. The ability to get free updates on Windows 10 is a pretty big deal because it is still the most widely used Windows OS, accounting for just over 53% of ins

Irregular raises $80 million to secure frontier AI models

On Wednesday, AI security firm Irregular announced $80 million in new funding in a round led by Sequoia Capital and Redpoint Ventures, with participation from Wiz CEO Assaf Rappaport. A source close to the deal said the round valued Irregular at $450 million. “Our view is that soon, a lot of economic activity is going to come from human-on-AI interaction and AI-on-AI interaction,” co-founder Dan Lahav told TechCrunch, “and that’s going to break the security stack along multiple points.” Former

Consumer Reports calls Microsoft 'hypocritical' for stranding millions of Windows 10 PCs

picture alliance/Contributor/picture alliance via Getty Images Follow ZDNET: Add us as a preferred source on Google. ZDNET's key takeaways CR says that Windows 10's end of support will strand millions of PC owners. It calls Microsoft's actions "hypocritical" and cites national security concerns. CR also calls for continued free security updates. Consumer Reports (CR), the venerable consumer rights organization known for its in-depth product testing, sent a letter to Microsoft CEO Satya N

From Qubits to Qubucks: Quantum Digital Currency

Quantum computing is often discussed in terms of its potential to revolutionize scientific discovery and to challenge cryptographic paradigms [1], but it could also change our relationship with money. By using quantum states, quantum currency could solve the double-spending problem and address throughput issues associated with distributed ledgers (blockchain), paving the way for the digital cash of the future. Digital Banking vs. Digital Currency To understand quantum currency, we should first

Update your Samsung phone ASAP to patch this zero-day flaw exploited in the wild

Sabrina Ortiz/ZDNET Follow ZDNET: Add us as a preferred source on Google. ZDNET's key takeaways Samsung issued a patch for a zero-day vulnerability. Android devices are affected by ongoing attacks in the wild. Samsung users should accept security updates immediately. Samsung has issued a patch to resolve a critical vulnerability impacting its Android smartphone users. All impacted phone models will receive the fix, which patches a vulnerability tracked as CVE-2025-21043. The security flaw

Best Home Security Systems for Renters in 2025: Compact and Movable

Is it easy to add more sensors to the security system? Does it support add-ons like cameras or smart locks if you ever want to expand? Does the system integrate with your preferred smart home platform, such as Amazon Alexa, Google Assistant, or Apple HomeKit? Can it work with third-party smart home devices? Is the app easy to use and intuitive for first-timers? Does it make setup easy? Can you quickly arm or disarm the system from the app? Does the security kit come with basic sensors for fro

About the security content of iOS 15.8.5 and iPadOS 15.8.5

About the security content of iOS 15.8.5 and iPadOS 15.8.5 This document describes the security content of iOS 15.8.5 and iPadOS 15.8.5. About Apple security updates For our customers' protection, Apple doesn't disclose, discuss, or confirm security issues until an investigation has occurred and patches or releases are available. Recent releases are listed on the Apple security releases page. Apple security documents reference vulnerabilities by CVE-ID when possible. For more information ab

Apple releases iOS 15.8.5 security update for 10-year old iPhone 6s

About the security content of iOS 15.8.5 and iPadOS 15.8.5 This document describes the security content of iOS 15.8.5 and iPadOS 15.8.5. About Apple security updates For our customers' protection, Apple doesn't disclose, discuss, or confirm security issues until an investigation has occurred and patches or releases are available. Recent releases are listed on the Apple security releases page. Apple security documents reference vulnerabilities by CVE-ID when possible. For more information ab

HackEthix 2025: Training Kerala’s Next Generation of Cyber Defenders

The IEEE Student Branch of Mohandas College of Engineering and Technology (MCET) brought the tech community together with HackEthix 2025. The July 19, 2025, event at the MCET campus in Trivandrum was Kerala’s largest one-day cybersecurity workshop championed by the Computer Society Chapter Grant Initiative. It’s a crucial first step in training and equipping the next generation of cyber professionals. Cybersecurity already faces a talent shortage and skills gap. Global security job vacancies gr

Cybersecurity provider Netskope boosts IPO range as it tests tech hot streak

Sanjay Beri, CEO and founder of Netskope Inc., listens during a Bloomberg West television interview in San Francisco, California. Netskope is targeting a $7.3 billion valuation in its upcoming initial public offering, after lifting its planned price range. The cybersecurity company said it plans to sell 47.8 million shares at between $17 and $19 apiece. The deal would raise as much as $908 million at the top end. That's up from a previous range of $15 to $17 a share the company revealed in a

Cybersecurity provider Netskope boosts IPO range as it tests tech hotstreak

Sanjay Beri, chief executive officer and founder of Netskope Inc., listens during a Bloomberg West television interview in San Francisco, California. Netskope is targeting a $7.3 billion valuation in its upcoming initial public offering, after lifting its planned price range. The cybersecurity company said it plans to sell 47.8 million shares at between $17 and $19 apiece. The deal would raise as much as $908 million at the top end. That's up from a previous range of $15 to $17 a share the co

Samsung patches zero-day security flaw used to hack into its customers’ phones

Samsung says it has fixed a zero-day security vulnerability that is being used to hack into its customers’ phones. The phone maker said the security flaw, discovered in a software library for displaying images on Samsung devices, allows hackers to remotely plant malicious code on Samsung devices running Android 13 through the most recent version, Android 16. Samsung’s advisory said security teams from Meta and WhatsApp privately notified the company on August 13 and was told that “an exploit f

Team-Wide VMware Certification: Your Secret Weapon for Security

When one person on your IT team is VMware certified, that’s a win. But when your entire team is certified? That’s a force multiplier for innovation, retention, and your security posture. Organizations that invest in team-wide certification build high-performing environments that are more collaborative, secure, and future-ready. The result: smoother rollouts, fewer errors, faster incident response, and a workforce that’s confident, capable, and committed. Certification Is a Security Strategy

Google may shift to risk-based Android security patch rollouts - what that means for you

Elyse Betters Picaro / ZDNET Follow ZDNET: Add us as a preferred source on Google. ZDNET's key takeaways Google may change how Android security updates work. But larger patch cycles might give hackers more time. 'High-risk first' model could streamline OEM patches. Google is considering an overhaul of security patch update rollouts in a bid to improve Android security. Risk-based update system According to Android Authority, the new system -- dubbed the "Risk-Based Update System" (RBUS)

Webinar: Your browser is the breach — securing the modern web edge

The web browser has quietly become one of the most critical components of enterprise infrastructure—and one of the most dangerous. On September 29th at 12:00 PM ET, BleepingComputer and SC Media will co-host a live webinar with browser security experts from Push Security, exploring how modern web browsers have become the primary attack surface for identity-based intrusions, SaaS abuse, and session hijacking. The webinar "Your Browser Is the Breach: Securing the Modern Web Edge" will explore th

Best Home Security Cameras Without Subscriptions in 2025: No-Fee Favorites

Does the camera have the ability to listen to audio and initiate a two-way conversation using the app? Does the camera have night vision that can cover the space you have in mind? Is the app easy to understand, control and use to change settings? Does the camera work with your existing home security system or your preferred voice assistant? Can video be stored without fees? Is it local storage under your control or cloud storage? Do you have to purchase your own storage device? Can you share

Locking Your Social Security Number Can Protect You From Identity Theft – Here's How It Works

Credit freezes are your free shield against thieves. fstop123/Getty Images Your Social Security number is a crucial piece of personal information. It's used for everything from getting a new job to securing lines of credit, making it a prime target for identity thieves. This nine-digit number is linked to health benefits, taxes and more. As we see major breaches happen more and more often, protecting your SSN is more important than ever. You can pay for monitoring, but there is a tougher, free

Crowdstrike and Meta just made evaluating AI security tools easier

fotograzia/Moment via Getty Images Follow ZDNET: Add us as a preferred source on Google. ZDNET's key takeaways AI is both a cybersecurity threat and a solution. Benchmarks will test LLMs for real-world cybersecurity tasks. The suite could help developers build better models. Overwhelmed with cybersecurity tool options? A new set of benchmark tests aims to help you evaluate them and find the right ones for you. Also: Navigating AI-powered cyber threats in 2025: 4 expert security tips for b

Microsoft reminds of Windows 10 support ending in 30 days

On Friday, Microsoft reminded customers once again that Windows 10 will reach its end of support in 30 days, on October 14. Windows 10 2015 LTSB and Windows 10 IoT Enterprise LTSB 2015 will also reach the end of extended support on the same date. After it retires Windows 10, Microsoft will stop providing bug fixes or technical assistance for issues affecting security, stability, or usability. "On October 14, 2025, Windows 10, version 22H2 (Home, Pro, Enterprise, Education, and IoT Enterprise

Exclusive: Google wants to make Android phones safer by switching to ‘risk-based’ security updates

Mishaal Rahman / Android Authority For the past decade, Google has consistently published an Android Security Bulletin every month, even if the company wasn’t ready to roll out a security update to its own Pixel devices. These bulletins detail the vulnerabilities that have been fixed in that month’s security release, with issues ranging from low to critical in severity. Given how large and complex the Android operating system and its underlying components are, it’s not unusual to see a dozen or

Yearly applications now open to Apple’s Security Research Device Program

For the past few years, Apple has been inviting experienced researchers to apply to its security program, which issues iPhones that are especially modified to make it easier to investigate vulnerabilities. Now, applications are open to next year’s program. Here’s how you can apply. This year’s application period ends October 31 This is how Apple describes its Security Research Device Program: “The Security Research Device (SRD) is a specially fused iPhone that allows you to perform iOS securi