Latest Tech News

Stay updated with the latest in technology, AI, cybersecurity, and more

Filtered by: formation Clear Filter

FBI warns of cybercriminals using fake FBI crime reporting portals

The FBI warned today that cybercriminals are impersonating its Internet Crime Complaint Center (IC3) website in what the law enforcement agency described as "possible malicious activity." Although it didn't share any examples and didn't point to specific attacks, the FBI said that such spoofed websites could be used by attackers in financial scams or to steal the visitors' personal information. "Threat actors create spoofed websites often by slightly altering characteristics of legitimate webs

Upgraded to iOS 26? Watch out for this AI feature

Kerry Wan/ZDNET Follow ZDNET: Add us as a preferred source on Google. ZDNET's key takeaways AI news and entertainment summaries return to iOS 26. The feature has a tendency to inaccurately summarize information. Apple offers a disclaimer before enabling the feature. AI can handle a lot well, including computational tasks, schedule coordination, and answering simple questions, but one area it tends to struggle with is message summarization. If you've tested out AI summaries in your Message

OpenAI might be developing a smart speaker, glasses, voice recorder, and a pin

Posts from this author will be added to your daily email digest and your homepage feed. One of the mysterious AI devices that OpenAI is considering developing with Apple’s former chief design officer, Jony Ive, “resembles a smart speaker without a display,” The Information reports. People “with direct knowledge of the matter” told the publication that OpenAI has already secured a contract with Luxshare, and has also approached Goertek — two of Apple’s product assemblers — to supply components l

Mysterious Object From Beyond Solar System May Be "Seed" Traveling Galaxy and Creating New Planets, Paper Finds

Astronomers have been fascinated after spotting an object earlier this year that came from interstellar space as is now hurtling through our inner solar system. Since then, they've been using powerful telescopes to study the mysterious object, trying to understand its unusual composition and exact origins. Most agree that it's probably a comet, albeit an unusual one, though at least one has posited that it could be a remnant of an advanced extraterrestrial civilization — a colorful claim, but o

VC giant Insight Partners warns thousands after ransomware breach

New York-based venture capital and private equity firm Insight Partners is notifying thousands of individuals whose personal information was stolen in a ransomware attack. The company disclosed the cybersecurity incident in February, when it said that a threat actor gained access to its network following a "sophisticated social engineering attack." Two months later, Insight Partners confirmed that the attackers had also stolen sensitive data during the breach, including banking and tax informa

Mother of All Demos (1968)

SUMMARY Douglas Engelbart's 1968 "Mother of All Demos" at SRI showcased interactive computing innovations, including the mouse debut, hypertext, real-time editing, and collaborative tools, envisioning augmented human intellect. STATEMENTS The Augmented Human Intellect Research Center at Stanford Research Institute has pursued computer systems that enhance intellectual work by providing instant responsiveness to user actions throughout the day. The demo features a computer mouse that controls

Mother of All Demos

SUMMARY Douglas Engelbart's 1968 "Mother of All Demos" at SRI showcased interactive computing innovations, including the mouse debut, hypertext, real-time editing, and collaborative tools, envisioning augmented human intellect. STATEMENTS The Augmented Human Intellect Research Center at Stanford Research Institute has pursued computer systems that enhance intellectual work by providing instant responsiveness to user actions throughout the day. The demo features a computer mouse that controls

Stop waiting on NVD — get real-time vulnerability alerts now

In today’s fast-paced digital environment, cybersecurity is no longer optional - it’s essential. Vulnerability management has become a core component of every security strategy and keeping track of vulnerability alerts is an issue facing many businesses. It doesn’t take much for even a small business to have hundreds, if not thousands of software across their systems. With nearly 10% of vulnerabilities exploited in 2024, a business could easily have dozens of possible breaches in the offing if

Read to forget

Read to Forget 05 Jul, 2025 I read to forget. Even when studying or working on papers for a PhD, I approach texts with the same mindset: I'm not a storage device that needs to save all bits of information. I am more of a system of Bayesian beliefs, constantly evolving and updating in small, incremental steps. I remember co-workers highlighting large chunks of text, sometimes 40%. That doesn't make sense to me. We can only read a text once, given the number of compelling works and the limited

The HackberryPi CM5 handheld computer

The HackberryPi_CM5 project repository The HackberryPi_CM5 project is a RaspberryPi Compute Module SBC(single board computer) powered handheld computer with reuse of original keyboard from old Blackberry phones. The goal of the project is to create a portable linux-powered computer that lets the user gain a deeper understanding of Linux and explore the architecture of hardware, software, and the Linux kernel. This repository will be used to share information about the project and tutorial about

Minerals represent potential biosignatures in the search for life on Mars

Chemical and sedimentological data indicate that reduced iron and sulfur were generated, mobilized and precipitated following the deposition of fine-grained oxidized iron- and phosphorous-bearing sediment. Except when found in authigenic nodules and reaction front rims, phosphate is not associated with a mineral phase (for example, there is no indication that apatite or merrillite are present; Fig. 4c). Accordingly, we suggest that during deposition, phosphate was adsorbed on Fe3+-, Al- and Si-r

'Clearest sign' yet of ancient life on Mars

Chemical and sedimentological data indicate that reduced iron and sulfur were generated, mobilized and precipitated following the deposition of fine-grained oxidized iron- and phosphorous-bearing sediment. Except when found in authigenic nodules and reaction front rims, phosphate is not associated with a mineral phase (for example, there is no indication that apatite or merrillite are present; Fig. 4c). Accordingly, we suggest that during deposition, phosphate was adsorbed on Fe3+-, Al- and Si-r

PKM apps need to get better at resurfacing information

I’m a happy user of a number of apps that can be classified under the nebulous category of Personal Knowledge Management (PKM) software: Obsidian (note taking) Things (task management) Drafts (quick capture) Readwise Reader (RSS and read-later) Raindrop (bookmarking and archiving) These apps allow me to work with vast amounts of digital information. They let me: Quickly capture information from my computer or physical environment Organize captured data using categories and/or tags Conne

Microsoft reportedly plans to start using Anthropic models to power some of Office 365's Copilot features

Microsoft reportedly plans to begin using Anthropic's latest Claude models to power some of the Copilot features in its Office 365 apps. In a report published Tuesday, The Information said the tech giant would announce the change "in the coming weeks." Microsoft currently relies on OpenAI's tech to power the majority of AI features found inside of Word, Excel, Outlook and PowerPoint. As an outsider looking in, Microsoft's embrace of Anthropic's models would appear to signal a deepening split be

Kosovo hacker pleads guilty to running BlackDB cybercrime marketplace

Kosovo national Liridon Masurica has pleaded guilty to running BlackDB.cc, a cybercrime marketplace that has been active since 2018. Kosovar authorities arrested the 33-year-old defendant (also known online as @blackdb) on December 14, 2024. He was extradited to the United States on May 9, 2025, and detained following his court appearance in Tampa on May 12. Masurica was the lead administrator of the online criminal marketplace BlackDB.cc, which has been operating for almost seven years, betwe

VC giant Insight Partners notifies staff and limited partners after data breach

Venture capital firm Insight Partners says it has completed notifying a number of individuals, including the firm’s limited partners, whose personal information was stolen by hackers in a January data breach. In a statement late last week, the company said it completed its review in August following the data breach, which it described as a “social engineering attack” without further explanation. According to its earlier notice, the stolen data included information about certain Insight Partner

NotebookLM isn’t just for students. Here are 4 ways I use it in my daily life

Andy Walker / Android Authority I consider myself a generative AI skeptic, with my initial interest in the technology turning into frustration and distrust. But there’s one tool that has genuinely impressed me over the past few months: NotebookLM. Its power lies in the ability for you to set custom sources that the service’s chatbot draws information from — leading to better quality responses compared with many of the other tools I’ve experimented with. Most people dismiss NotebookLM as a too

Rocketships and Slingshots

The dominant metaphor for a successful startup these days is the rocketship. The not so humble brags are all over x and the press, founders and VCs saying - “0-100m in ARR faster than any company in history” and “idea to $1m in revenue in a month.” I get why these are exciting. The stories are simple, the progress is amazing, the pull of the market is irresistible. Sometimes these will be the biggest and most interesting companies of the future. Then again, as with most stories, the realities o

Non-Obviously Great Startups

The dominant metaphor for a successful startup these days is the rocketship. The not so humble brags are all over x and the press, founders and VCs saying - “0-100m in ARR faster than any company in history” and “idea to $1m in revenue in a month.” I get why these are exciting. The stories are simple, the progress is amazing, the pull of the market is irresistible. Sometimes these will be the biggest and most interesting companies of the future. Then again, as with most stories, the realities o

M&S hackers claim to be behind Jaguar Land Rover cyber attack

M&S hackers claim to be behind Jaguar Land Rover cyber attack 52 minutes ago Share Save Joe Tidy Cyber correspondent, BBC World Service Share Save Getty Images A group of young English-speaking hackers are claiming to be behind the cyber attack which has halted the global production lines of Jaguar Land Rover (JLR). The group is bragging about the hack on the messaging app Telegram, sharing screenshots apparently taken from inside the car maker's IT networks. The gang is also responsible for

Google's NotebookLM now lets you customize your AI podcasts in tone and length

NotebookLM/Screenshot by Nina Raemont ZDNET's key takeaways NotebookLM introduced new audio formats on Wednesday. The formats offer users more interactive, customizable information distillation. The tool could save students and workers time. Google's NotebookLM audio overview feature went viral because it uses AI to create engaging, realistic podcasts from your content. The feature just got a facelift, making it even more helpful, allowing you to customize the podcast to suit your needs eve

Cloudflare hit by data breach in Salesloft Drift supply chain attack

Cloudflare is the latest company impacted in a recent string of Salesloft Drift breaches, part of a supply-chain attack disclosed last week. The internet giant revealed on Tuesday that the attackers gained access to a Salesforce instance it uses for internal customer case management and customer support, which contained 104 Cloudflare API tokens. Cloudflare was notified of the breach on August 23, and it alerted impacted customers of the incident on September 2. Before informing customers of t

How to perform a reverse phone number lookup

In an age of constant communication, receiving phone calls or messages from unknown numbers has become increasingly common. Whether it's a missed call from an unfamiliar number, a potential scam or a wrong number, performing a reverse phone number lookup can help you identify the caller. You could start your search with free tools like Google or Whitepages, but if you’re struggling to find the person behind the number, paid services such as Spokeo or BeenVerified might give you more detail. In t

Bayes, Bits and Brains

Bayes, bits & brains This site is about probability and information theory. We'll see how they help us understand machine learning and the world around us. A few riddles More about the content, prerequisites, and logistics later. I hope you get a feel for what this is about by checking out the following riddles. I hope some of them nerd-snipe you! 😉 You will understand all of them at the end of this minicourse. 🧠 Intelligence test Test your intelligence with the following widget! You will be

Samsung’s take on Pixel Screenshots is finally available to global users

Ryan Haines / Android Authority TL;DR Global Galaxy owners on One UI 6 or later can now try out the Collections app. This app was previously exclusive to users in China. The app stores information and allows you to easily search for it, sort it by app, and summarize it with AI. Google offers a handy app called Pixel Screenshots, which makes it easy to organize and recall information from screenshots and photos. If you didn’t know, Samsung has a similar, but different app called Collections.

Fake accounts drove the DeepSeek AI hype and distorted markets

From AI Darling to Disinformation Playbook: How Fake Accounts Managed a Market Frenzy and What DeepSeek’s Hype Teaches Leaders DeepSeek, a new Chinese AI model, stormed app charts and briefly sent shockwaves through global markets. However, our disinformation research team found that much of this excitement was artificial — driven by thousands of fake profiles working in tandem. Their behavior bore the hallmarks of state-linked bot networks, amplifying hype and distorting market perception.

Credit Bureau TransUnion Hit With Data Breach Affecting 4.4 Million People

The TransUnion data breach exposed the data of up to 4.4 million customers. CNET Major credit bureau TransUnion has suffered a data breach that exposed sensitive information belonging to 4.4 million customers, including names and Social Security numbers. The data breach took place on July 28, meaning the sensitive information could have been sold and distributed throughout the dark web already. TransUnion is notifying people who may have been affected that their information could be exposed an

Incogni deletes your family’s private info from the internet – here’s why that matters

In today’s world, everyone needs to have dozens, if not hundreds of different online accounts to keep up with their everyday life. That’s a lot of potentially sensitive data in the hands of tons of different companies – and it’s easy to not think about that. You and your family’s data is incredibly valuable to data brokers, but it isn’t too difficult to put a stop to it – and protect the online privacy of your family. Protecting your online privacy It can be hard to take control of your online

RFC 8594: The Sunset HTTP Header Field (2019)

Internet Engineering Task Force (IETF) E. Wilde Request for Comments: 8594 May 2019 Category: Informational ISSN: 2070-1721 The Sunset HTTP Header Field Abstract This specification defines the Sunset HTTP response header field, which indicates that a URI is likely to become unresponsive at a specified point in the future. It also defines a sunset link relation type that allows linking to resources providing information about an upcoming resource or service sunset. Status of This Memo This docume