Latest Tech News

Stay updated with the latest in technology, AI, cybersecurity, and more

Filtered by: shin Clear Filter

Scammers are faking cell towers now; Americans bad at spotting scams

Mobile carriers are very slowly getting better at detecting and blocking scam texts, but it seems the fraudsters may still be staying ahead of the game. Scammers are now using a technology known as SMS blasters, backpack-sized devices that can trick smartphones into thinking they are cell towers … Scammers faking cell towers Wired says the technology is not new, but there has been a marked increase in its use. Over the last year, there has been a marked uptick in the use of so-called “SMS bl

Are portable wind generators a viable alternative to solar power? My verdict after testing one at home

Shine Turbine Kit ZDNET's key takeaways The Shine Turbine kit is on sale for $279, while the Essentials Kit is on sale for $342. The kit includes everything you need to turn wind into electrical energy, and the turbine features a 12,000 mAh battery. There are limitations, which include the weight of the kit and the 40W of power it taps out at. View now at Shineturbine Follow ZDNET: Add us as a preferred source on Google. I cover a lot of solar generators here, and they are all the rage. I've

Rendezvous Hashing Explained (2020)

Rendezvous hashing is an algorithm to solve the distributed hash table problem - a common and general pattern in distributed systems. There are three parts of the problem: Keys: unique identifiers for data or workloads Values: data or workloads that consume resources Servers: entities that manage data or workloads For example, in a distributed storage system, the key might be a filename, the value is the file data, and the servers are networked data servers that collectively store all of the f

Microsoft and Cloudflare disrupt massive RaccoonO365 phishing service

Microsoft and Cloudflare have disrupted a massive Phishing-as-a-Service (PhaaS) operation, known as RaccoonO365, that helped cybercriminals steal thousands of Microsoft 365 credentials. In early September 2025, in coordination with Cloudflare's Cloudforce One and Trust and Safety teams, Microsoft's Digital Crimes Unit (DCU) disrupted the cybercrime operation by seizing 338 websites and Worker accounts linked to RaccoonO365. The cybercrime group behind this service (also tracked by Microsoft as

I took a Coros smartwatch on a fly-fishing trip - and it made my Apple and Garmin look bad

Coros Nomad smartwatch ZDNET's key takeaways The Coros Nomad is available now in Green, Brown, and Dark Grey for $349. It's built to withstand the elements with detailed metrics and focused journal utilities for fishing. There is no speaker to playback voice notes, no solar charging, and no LED flashlight to see in the dark. View now at Coros Follow ZDNET: Add us as a preferred source on Google. I've had the opportunity to test a lot of smartwatches, but it's still tough to find one watch th

New VoidProxy phishing service targets Microsoft 365, Google accounts

A newly discovered phishing-as-a-service (PhaaS) platform, named VoidProxy, targets Microsoft 365 and Google accounts, including those protected by third-party single sign-on (SSO) providers such as Okta. The platform uses adversary-in-the-middle (AitM) tactics to steal credentials, multi-factor authentication (MFA) codes, and session cookies in real time. VoidProxy was discovered by Okta Threat Intelligence researchers, who describe it as scalable, evasive, and sophisticated. The attack begi

This 2FA phishing scam pwned a developer - and endangered billions of npm downloads

Elyse Betters Picaro / ZDNET Follow ZDNET: Add us as a preferred source on Google. ZDNET's key takeaways A phishing email was at the heart of the attack. NPM team quickly removed backdoored versions. 18 packages hit, with 2B+ downloads every week. A new digital supply chain attack has targeted popular open-source npm packages with at least two billion downloads per week. 'I've been pwned' On Sept. 8, Josh Junon, a package maintainer whose account was at the center of the attack, revealed

Hackers hijack npm packages with 2 billion weekly downloads in supply chain attack

In what is being called the largest supply chain attack in history, attackers have injected malware into NPM packages with over 2.6 billion weekly downloads after compromising maintainers' accounts in a phishing attack. One of the package maintainers whose accounts were hijacked in this supply-chain attack confirmed the incident earlier today, stating that he was aware of the compromise and adding that the phishing email came from support [at] npmjs [dot] help, a domain that hosts a website imp

iCloud Calendar abused to send phishing emails from Apple’s servers

iCloud Calendar invites are being abused to send callback phishing emails disguised as purchase notifications directly from Apple's email servers, making them more likely to bypass spam filters to land in targets' inboxes. Earlier this month, a reader shared an email with BleepingComputer that claimed to be a payment receipt for $599 charged against the recipient's PayPal account. This email included a phone number if the recipient wanted to discuss the payment or make changes to it. "Hello Cu

What happened when I brought a Coros smartwatch on a fly-fishing trip

Coros Nomad smartwatch ZDNET's key takeaways The Coros Nomad is available now in Green, Brown, and Dark Grey for $349. It's built to withstand the elements with detailed metrics and focused journal utilities for fishing. There is no speaker to playback voice notes, no solar charging, and no LED flashlight to see in the dark. View now at Coros Follow ZDNET: Add us as a preferred source on Google. I've had the opportunity to test a lot of smartwatches, but it's still tough to find one watch th

Finally, a smartwatch for fishing enthusiasts - my verdict after taking it on the river

Coros Nomad smartwatch ZDNET's key takeaways The Coros Nomad is available now in Green, Brown, and Dark Grey for $349. It's built to withstand the elements with detailed metrics and focused journal utilities for fishing. There is no speaker to playback voice notes, no solar charging, and no LED flashlight to see in the dark. View now at Coros Follow ZDNET: Add us as a preferred source on Google. I've had the opportunity to test a lot of smartwatches, but it's still tough to find one watch th

6 browser-based attacks all security teams should be ready for in 2025

What security teams need to know about the browser-based attack techniques that are the leading cause of breaches in 2025. “The browser is the new battleground.” “The browser is the new endpoint”. These are statements you’ll run into time and again as you read articles on websites like this one. But what does this actually mean from a security perspective? In this article, we’ll explore what security teams are trying to stop attackers from doing in the browser, breaking down what a “browser-b

For all that's holy, can you just leverage the Web, please?

When I moved in with my wife Laura in 2005, we lived in a shared apartment in Barcelona that had an ancient washing machine that was just there already, no idea who initially bought it. I managed to break the washing machine door's closing mechanism some time in 2006, so for a few weeks, whenever we did the washing, we had to lean a chair against the door so it wouldn't open. At the time, we were both students and living on a small budget. Eventually, later in the same year, we bought an Electr

Google says Gmail security is “strong and effective” as it denies major breach

The sky is falling, and Gmail has supposedly been hacked to bits by malicious parties unknown. Or has it? Reports circulated last week claiming that Gmail was the subject of a major data breach, citing a series of warnings Google has distributed and increasing reports of phishing attacks. The hysteria was short-lived, though. In a brief post on its official blog, Google says that Gmail's security is "strong and effective," and reports to the contrary are mistaken. This story seems to have devel

'2.5 billion Gmail users at risk'? Entirely false, says Google

SOPA Images / LightRocket via Getty Images Follow ZDNET: Add us as a preferred source on Google. ZDNET's key takeaways Google did not issue a warning about a major security breach. But hackers have been targeting Salesforce data in the cloud. Always be alert for phishing and vishing attacks. Worried about reports that a major security breach has impacted your Gmail account? Well, apparently, those claims are much ado about nothing. Also: How to encrypt any email - in Outlook, Gmail, and o

Google debunks claims of major Gmail security alert

Edgar Cervantes / Android Authority TL;DR Google says reports of a mass Gmail security warning are false. Some outlets reporting on phishing data last week framed it as a mass Gmail security alert. The company insists Gmail protections remain strong, but advises using passkeys and learning to spot phishing emails. Online threats are scary enough without false or overhyped alarms adding to the confusion. Last week, several outlets claimed that Gmail had issued a major warning to all 2.5 billi

Best Washing Machines for Your Home in 2025

It's not always about the features that you most regularly use, but about having features available that you might sometimes need to use. If available features are driving your comparative shopping experience for washing machines, GE offers a top-tier, front-loading model with consistent customer satisfaction and just about every available add-on. While it is more expensive than the models listed above, it's less expensive than other models that offer as many features as it does. This washing m

This ‘Training Day’ Meme Is Getting Me Through the Collapse of American Democracy

The U.S. isn’t doing very well right now. The nation’s capital is under military occupation, the president is pursuing a campaign of retribution against his political enemies, and the wealthiest people in the country have suddenly embraced government ownership of their companies if it means they don’t have to pay more in taxes. But through it all, we still have our memes, the true opiate of the masses. And the latest meme that I can’t get enough of involves audio from an old movie, cute dogs, a

Shinobi: Art of Vengeance Is a Sleek, Brutal Return to 2D Ninja Action

The game industry has seemingly made 2025 the "year of the ninja" with the release of Assassin's Creed: Shadows and Ninja Gaiden: Ragebound earlier in the year, as well as the upcoming Ghost of Yotei and Ninja Gaiden 4. Amid all these high-profile ninja releases, Sega's iconic Shinobi franchise returns with what could be its best game in the series. Dormant for more than a decade, Shinobi: Art of Vengeance ($30) does everything right when it comes to reviving the beloved franchise. It has a stu

Shinobi: Art of Vengeance Review: A Sleek, Brutal Return to 2D Ninja Action

The game industry has seemingly made 2025 the "year of the ninja" with the release of Assassin's Creed: Shadows and Ninja Gaiden: Ragebound earlier in the year, as well as the upcoming Ghost of Yotei and Ninja Gaiden 4. Amid all these high-profile ninja releases, Sega's iconic Shinobi franchise returns with what could be its best game in the series. Dormant for more than a decade, Shinobi: Art of Vengeance ($30) does everything right when it comes to reviving the beloved franchise. It has a stu

Are portable wind generators legit? I tested one at home - here's my buying advice

Shine Turbine Kit ZDNET's key takeaways The Shine Turbine kit is on sale for $279, while the Essentials Kit is on sale for $342. The kit includes everything you need to turn wind into electrical energy, and the turbine features a 12,000 mAh battery. There are limitations, which include the weight of the kit and the 40W of power it taps out at. View now at Shineturbine Follow ZDNET: Add us as a preferred source on Google. I cover a lot of solar generators here, and they are all the rage. I've

AI website builder Lovable increasingly abused for malicious activity

Cybercriminals are increasingly abusing the AI-powered Lovable website creation and hosting platform to generate phishing pages, malware-dropping portals, and various fraudulent websites. The malicious sites created through the platform impersonate large and recognizable brands, and feature traffic filtering systems like CAPTCHA to keep bots out. While Lovable has taken steps to better protect its platform from abuse, as AI-powered site generators increase in number, the barrier to entering cy

Hackers steal Microsoft logins using legitimate ADFS redirects

Hackers are using a novel technique that combines legitimate office.com links with Active Directory Federation Services (ADFS) to redirect users to a phishing page that steals Microsoft 365 logins. The method lets attackers bypass traditional URL-based detection and the multi-factor authentication process by leveraging a trusted domain on Microsoft's infrastructure for the initial redirect. Legitimacy of a trusted redirect Researchers at Push Security, a company that provides protection solut

Mobile Phishers Target Brokerage Accounts in ‘Ramp and Dump’ Cashout Scheme

Cybercriminal groups peddling sophisticated phishing kits that convert stolen card data into mobile wallets have recently shifted their focus to targeting customers of brokerage services, new research shows. Undeterred by security controls at these trading platforms that block users from wiring funds directly out of accounts, the phishers have pivoted to using multiple compromised brokerage accounts in unison to manipulate the prices of foreign stocks. This so-called ‘ramp and dump‘ scheme borr

Booking.com phishing campaign uses sneaky 'ん' character to trick you

Threat actors are leveraging a Unicode character to make phishing links appear like legitimate Booking.com links in a new campaign distributing malware. The attack makes use of the Japanese hiragana character, ん, which can, on some systems, appear as a forward slash and make a phishing URL appear realistic to a person at a casual glance. BleepingComputer has further come across an Intuit phishing campaign using a lookalike domain using the letter L instead of 'i' in Intuit. Booking.com phishi

New downgrade attack can bypass FIDO auth in Microsoft Entra ID

Security researchers have created a new FIDO downgrade attack against Microsoft Entra ID that tricks users into authenticating with weaker login methods, making them susceptible to phishing and session hijacking. These weaker login channels are vulnerable to adversary-in-the-middle phishing attacks that employ tools like Evilginx, enabling attackers to snatch valid session cookies and hijack the accounts. Although the attack doesn't prove a vulnerability in FIDO itself, it shows that the syste

New downgrade attack can bypass FIDO auth in Microsoft Entra ID

Security researchers have created a new FIDO downgrade attack against Microsoft Entra ID that tricks users into authenticating with weaker login methods, making them susceptible to phishing and session hijacking. These weaker login channels are vulnerable to adversary-in-the-middle phishing attacks that employ tools like Evilginx, enabling attackers to snatch valid session cookies and hijack the accounts. Although the attack doesn't prove a vulnerability in FIDO itself, it shows that the syste

How to Wash a Heated Blanket Safely

Crawling into a warm bed after a long, hard day is hard to beat, but it isn't always a given. As we work our way towards the fall, you're probably already looking forward to getting your electric heated blanket out of the closet. And if you don't already own one, now is the time to start shopping for one. But like other blankets, they do need some upkeep -- and things get more complicated when there is electricity involved. One obvious question has probably already sprung to mind. Whether you'r

Hackers leak Allianz Life data stolen in Salesforce attacks

Hackers have released stolen data belonging to US insurance giant Allianz Life, exposing 2.8 million records with sensitive information on business partners and customers in ongoing Salesforce data theft attacks. Last month, Allianz Life disclosed that it suffered a data breach when the personal information for the "majority" of its 1.4 million customers was stolen from a third-party, cloud-based CRM system on July 16th. While the company did not name the provider, BleepingComputer first repor

The Rise of Native Phishing: Microsoft 365 Apps Abused in Attacks

Attackers don’t need exploits; they need TRUST. Changes in attack methods reflect changes in generations. Gen Z, a generation known for prioritizing ease and efficiency, is now entering the cybersecurity landscape on both sides. Some are protecting data, and others are stealing it. With the rise of AI and no-code platforms in attackers’ phishing toolkits, building trust and deceiving users has never been easier. Threat actors are blending default-trusted tools with free, legitimate services to