Latest Tech News

Stay updated with the latest in technology, AI, cybersecurity, and more

Filtered by: secure Clear Filter

CERN Animal Shelter for Computer Mice (2011)

"Stop — Think — Click"... ...is the basic recommendation for securely browsing the Internet and for securely reading emails. Users who have followed this recommendation in the past were less likely to have their computer infected or their computing account compromised. However, still too many users click on malicious web-links, and put their computer and account at risk.

CERN Animal Shelter for Computer Mice

"Stop — Think — Click"... ...is the basic recommendation for securely browsing the Internet and for securely reading emails. Users who have followed this recommendation in the past were less likely to have their computer infected or their computing account compromised. However, still too many users click on malicious web-links, and put their computer and account at risk.

Team-Wide VMware Certification: Your Secret Weapon for Security

When one person on your IT team is VMware certified, that’s a win. But when your entire team is certified? That’s a force multiplier for innovation, retention, and your security posture. Organizations that invest in team-wide certification build high-performing environments that are more collaborative, secure, and future-ready. The result: smoother rollouts, fewer errors, faster incident response, and a workforce that’s confident, capable, and committed. Certification Is a Security Strategy

Signal lets you back up your chats for free now - plus its first-ever paid feature

Matthias Balk/picture alliance via Getty Images Follow ZDNET: Add us as a preferred source on Google. ZDNET's takeaways Privacy-centric messaging app Signal has a message backup option. The free tier stores up to 45 days of messages. You can pay $1.99 a month if you want to store more than 45 days. Signal is offering its first-ever backup option. In a post Monday, the security-focused messaging app company announced a new feature that lets you back up your messages for free. In the past,

Signal adds secure cloud backups to save and restore chats

Signal has introduced a new opt-in feature that helps users create end-to-end encrypted backups of their chats, allowing them to restore messages even if their phones are damaged or lost. Secure backups are already available in the latest Signal beta version for Android users and will also be rolled out to iOS and desktop devices after this testing phase. "If you do decide to opt in to secure backups, you'll be able to securely back up all of your text messages and the last 45 days' worth of m

Signal’s first paid feature adds encrypted media and message backups

is a senior reporter covering technology, gaming, and more. He joined The Verge in 2019 after nearly two years at Techmeme. Posts from this author will be added to your daily email digest and your homepage feed. Signal is launching its first paid feature: the ability to make secure, end-to-end encrypted backups of your media history older than 45 days and of your text message history for $1.99 per month. “Media requires a lot of storage, and storing and transferring large amounts of data is e

Signal Secure Backups

In the past, if you broke or lost your phone, your Signal message history was gone. This has been a challenge for people whose most important conversations happen on Signal. Think family photos, sweet messages, important documents, or anything else you don’t want to lose forever. This explains why the most common feature request has been backups; a way for people to get Signal messages back even if their phone is lost or damaged. After careful design and development, we are now starting to roll

Hue's Secure video doorbell can turn on Hue lights when someone comes to the door

Hue is best known for its smart lights, but recently the company ventured into home security with its Secure lineup of cameras. Now, parent Signify is releasing its first video doorbell, the Hue Secure, with several unique features it hopes will make it stand out against formidable competition from Nest and Amazon's Ring. To start with, the Hue doorbell comes with a 2K fisheye camera, more resolution than Nest and some of Ring's doorbell products, potentially offering more detailed video. Hue i

Battlefield 6 dev apologizes for requiring Secure Boot to power anti-cheat tools

Earlier this month, EA announced that players in its Battlefield 6 open beta on PC would have to enable Secure Boot in their Windows OS and BIOS settings. That decision proved controversial among players who weren't able to get the finicky low-level security setting working on their machines and others who were unwilling to allow EA's anti-cheat tools to once again have kernel-level access to their systems. Now, Battlefield 6 technical director Christian Buhl is defending that requirement as so

Cisco warns of max severity flaw in Firewall Management Center

Cisco is warning about a critical remote code execution (RCE) vulnerability in the RADIUS subsystem of its Secure Firewall Management Center (FMC) software. Cisco FCM is a management platform for the vendor’s Secure Firewall products, which provides a centralized web or SSH-based interface to allow administrators to configure, monitor, and update Cisco firewalls. RADIUS in FMC is an optional external authentication method that permits connecting to a Remote Authentication Dial-In User Service

A Unified Approach to Branch Security and SD-WAN: Streamlining Operations

The way we work has fundamentally shifted, with hybrid and remote models becoming a widespread reality. This evolution brings tremendous benefits but also presents significant challenges for IT and security teams tasked with ensuring seamless access to applications and protecting sensitive data outside the traditional corporate perimeter. Traditionally, network deployments often routed all internet traffic back to a central site through a perimeter firewall. While this provided security, backha

Call of Duty and Battlefield 6 will both require Secure Boot on Windows

is a news editor covering technology, gaming, and more. He joined The Verge in 2019 after nearly two years at Techmeme. Posts from this author will be added to your daily email digest and your homepage feed. To better protect against cheaters, Activision says that Call of Duty: Black Ops 7 players on PC will need to use hardware with Trusted Platform Module (TPM) 2.0 and have Windows’ Secure Boot feature turned on when the game is available later this year. Ahead of that, Activision is doing

Battlefield 6 anti-cheat system requires Secure Boot, shutting out Linux and legacy PCs

In a nutshell: Electronic Arts is preparing to launch the next chapter in the Battlefield saga and expects players to fully embrace the new FPS experience. However, many potential buyers may be disappointed by the game's lack of support for Linux-based platforms. Battlefield 6 will include a powerful anti-cheat system that requires players to enable Secure Boot on their Windows PCs. Battlefield Wire confirmed the news on X, stating that EA's anti-cheat technology will run at the kernel level on

The best password managers for Android of 2025: Expert tested

Bitwarden consistently features as one of my top password manager recommendations across numerous platforms, and Android is no different. Why we like it: With Bitwarden, you can sync unlimited credentials across as many devices as you want for free, so it's easy to access your logins, credit cards, identities, and notes wherever you need them. Saving and autofilling work well in mobile apps and browsers via biometric unlock with your fingerprint or face. Review: Bitwarden Bitwarden is open so

Show HN: NativeSwap – Low cost cross-chain swaps without wrappers or bridges

1 Connect Your Wallet Securely connect your preferred wallet (Ctrl, Metamask, or any Web3 wallet) to access your assets across blockchains. Your private keys remain in your control at all times. 2 Select Your Assets Choose your source and destination cryptocurrencies from our extensive list of supported assets. View real-time rates, fees, and estimated transaction times before proceeding with your swap. 3 Confirm Transaction Review the swap details, including exchange rate, fees, and destinati

Managing EFI boot loaders for Linux: Controlling secure boot (2015)

Managing EFI Boot Loaders for Linux: Controlling Secure Boot by Rod Smith, [email protected] Originally written: 2/22/2015; last update: 3/4/2023 This Web page is provided free of charge and with no annoying outside ads; however, I did take time to prepare it, and Web hosting does cost money. If you find this Web page useful, please consider making a small donation to help keep this site up and running. Thanks! Donate $1.00 Donate $2.50 Donate $5.00 Donate $10.00 Donate another value

Topics: boot db key keys secure

The best Apple AirTag accessories for 2025

AirTags can also help you keep track of larger bags and luggage, and you could easily slip one into an interior pocket and call it a day. But if you’d rather hook the tracker to the outside, you’ll need something a bit larger and more flexible than a standard key ring. Belkin’s Secure Holder with Strap is a good option: it comes in different colors and it’s budget friendly at only $13. The case opens up into two pieces, allowing you to sit the AirTag inside the circle and twist and snap the two

When root meets immutable: OpenBSD chflags vs. log tampering

Why ISO 27001 Demands Immutable Logs (Without Actually Saying So) # ISO 27001 is like that careful lawyer who never says exactly what they mean – it tells you what needs to be achieved, not how to do it. When it comes to logging, this is particularly telling: Control A.12.4.2 simply states that “logging information and logging facilities shall be protected against tampering and unauthorized access.” Period. How? That’s your problem to solve. But anyone who’s ever had to investigate a security

Topics: log logs root secure var

When Root Meets Immutable: OpenBSD Chflags vs. Log Tampering

Why ISO 27001 Demands Immutable Logs (Without Actually Saying So) # ISO 27001 is like that careful lawyer who never says exactly what they mean – it tells you what needs to be achieved, not how to do it. When it comes to logging, this is particularly telling: Control A.12.4.2 simply states that “logging information and logging facilities shall be protected against tampering and unauthorized access.” Period. How? That’s your problem to solve. But anyone who’s ever had to investigate a security

Topics: log logs root secure var

Linux and Secure Boot certificate expiration

Linux and Secure Boot certificate expiration [LWN subscriber-only content] Welcome to LWN.net The following subscription-only content has been made available to you by an LWN subscriber. Thousands of subscribers depend on LWN for the best news from the Linux and free software communities. If you enjoy this article, please consider subscribing to LWN. Thank you for visiting LWN.net! Linux users who have Secure Boot enabled on their systems knowingly or unknowingly rely on a key from Microsoft t

Samsung fixes the Secure Folder flaw that let anyone see what apps you’re hiding

Mishaal Rahman / Android Authority TL;DR Samsung has patched a Secure Folder flaw that previously allowed anyone with physical access to see your hidden apps and photos. The vulnerability existed because Secure Folder was implemented as a “work profile,” which key system components didn’t recognize as a highly secure space. One UI 8 reclassifies Secure Folder as a “private” profile, ensuring system apps now correctly hide its sensitive files and app information from view. Samsung’s Secure Fo

Try 1Password for free to save $20 (and all your unique passwords) for Prime Day

Using 1Password to remember every username and password that accumulates is easily one of the best quality-of-life improvements you can make in your digital world. In addition to saving all your passwords and secure information, 9to5Mac readers can also try 1Password free for 14 days and take home a $20 credit as a Prime Day exclusive! 1Password is hands-down the best fix for fumbling with passwords because it’s private, cross-platform, and the absolute leader in password management features. 1

One UI 8 gives you more control over where your Secure Folder apps pop up

Joe Maring / Android Authority TL;DR Samsung’s Secure Folder lets you lock files and even entire apps behind an extra layer of protection. One UI 8 has already started improving how Secure Folder is accessed, with a quick lockdown shortcut. Now we’re seeing Samsung add new settings for Secure Folder apps in your share sheet. Samsung likes to present its Galaxy smartphones as particularly secure devices, and has long leaned on its Knox security framework to highlight those features. That incl

Data-recovery firm tests $28, 500GB HDD from Amazon and gets surprising results

Fraudulent or misleading storage devices are, unfortunately, still easy to find via online marketplaces. It's also a common story that someone buys a shockingly cheap storage device from an unknown brand and ends up with a product that doesn’t perform as expected—or at all. With this in mind, data-recovery firm Secure Data Recovery recently bought a 500GB HDD from Amazon (the UnionSine HD2510) for $28 and tested it. The results were better than expected, but there are still reasons to avoid buy

Delta Chat is a decentralized and secure messenger app

Delta Chat is a decentralized and secure messenger app 💬 Reliable instant messaging with multi-profile and multi-device support ⚡️ Sign up to secure fast chatmail servers or use classic e-mail servers 🥳 Interactive web apps in chats for gaming and collaboration 🔒 Audited end-to-end encryption safe against network and server attacks 👉 FOSS software, built on Internet Standards, avoiding xkcd927 :) Download Available on mobile and desktop.

Infineon security microcontroller flaw enabled extraction of TPM secret keys

A few months ago, security researcher Thomas Roche presented his fundamental research on secure elements used in the YubiKey 5. The security element is the Infineon SLE78, which contains a proprietary implementation of the Elliptic Curve Digital Signature Algorithm (ECDSA). Using side-channel attacks and a great deal of smart research, the author discovered a vulnerability in Infineon Technologies' cryptographic library and, as a result, was able to extract the ECDSA secret key from the secure

Two exploits are threatening Secure Boot, but Microsoft is only patching one of them

Facepalm: Microsoft and the PC industry developed the Secure Boot protocol to prevent modern UEFI-based computers from being hacked or compromised during the boot process. However, just a few years later, the technology is plagued by a steady stream of serious security vulnerabilities. Cybercriminals are currently having a field day with Secure Boot. Security experts have uncovered two separate vulnerabilities that are already being exploited in the wild to bypass SB's protections. Even more co

Microsoft Edge now offers secure password deployment for businesses

Microsoft announced that a new Edge feature allowing employees to share passwords more securely in enterprise environments has reached general availability. Known as secure password deployment, this feature will be available to Microsoft Edge for Business users starting this week, minimizing the risk of unauthorized access by ensuring that employees don't accidentally share passwords with unintended recipients. The feature is available for Microsoft 365 Business Premium, E3, and E5 subscriptio

Security Service Edge(SSE): Powering the Modern Hybrid Workplace

The way we work has fundamentally shifted. Hybrid models, where employees split their time between the office and remote locations, are no longer a niche trend but a widespread reality. This evolution offers numerous benefits, including increased flexibility and improved work-life balance. However, it also presents significant challenges for IT and security teams tasked with ensuring seamless access to applications and protecting sensitive data outside the traditional corporate perimeter. Securi

Patch your Windows PC now before bootkit malware takes it over - here's how

Elyse Betters Picaro / ZDNET Windows users who don't always install the updates rolled out by Microsoft each month for Patch Tuesday will want to install the ones for June. That's because the latest round of patches fixes a flaw that could allow an attacker to control your PC through bootkit malware. Designated as CVE-2025-3052, the Secure Boot bypass flaw is a serious one, according to Binarly security researcher Alex Matrosov, who discovered the vulnerability. In a Binarly blog post publishe