Category: Tech

Highly Eccentric Hyperbolic Object Discovered: 3I/ATLAS

2025-07-03

A new near-Earth object candidate, A11pl3Z, was discovered by ATLAS Chile (W68) in four 30-second survey images taken on July 1 UT. Follow-up observations revealed a highly eccentric hyperbolic orbit (e ~ 6). Tentative reports suggest cometary activity, including a faint coma and a short tail. Designated 3I/ATLAS = C/2025 N1 (ATLAS), further observations are needed to better constrain its orbit and nature. Additional data will be published in the MPC's standard `Orbits and Observations of Comets` publication.

Critical Azure Vulnerabilities: Misconfigured Roles & VPN Key Leak

2025-07-02
Critical Azure Vulnerabilities: Misconfigured Roles & VPN Key Leak

Security researchers discovered multiple misconfigured Azure built-in roles granting excessive permissions. Coupled with a vulnerability in the Azure API allowing VPN key leaks, this creates an attack chain enabling a low-privileged user to access internal cloud assets and on-premises networks. The research details the discovery process, implications, and mitigation strategies. Ten built-in roles were found to be over-privileged, while the VPN key leak vulnerability has been patched by Microsoft. Recommendations include auditing problematic roles, using limited scopes, and creating custom roles with fine-grained permissions.

UK Law Lagging Behind: Undersea Cable Sabotage Exposes Legal Gaps

2025-07-02
UK Law Lagging Behind:  Undersea Cable Sabotage Exposes Legal Gaps

A UK government minister has warned that cyberattacks and undersea cable sabotage are blurring the lines between war and peace, highlighting flaws in UK law. The outdated 1885 Submarine Telegraph Act, with its paltry £1,000 fine, is woefully inadequate for modern threats. Recent incidents, such as suspected Russian attacks on underwater cables in Sweden, underscore the urgency. The government is considering a new Defence Readiness Bill to address state-sponsored cybercrime and undersea cable attacks, but faces challenges in defining 'acts of war' and balancing civil and military responses.

Tech

IKKO ActiveBuds: A Deep Dive into a Security Nightmare

2025-07-02
IKKO ActiveBuds: A Deep Dive into a Security Nightmare

This blog post details the security vulnerabilities discovered in the IKKO ActiveBuds earbuds, a device featuring integrated ChatGPT functionality. The author found that the device directly communicates with the OpenAI API using an easily accessible, unencrypted API key. Furthermore, the companion app suffers from multiple security flaws, allowing unauthorized access to user chat logs and user identification through IMEI guessing. While the manufacturer has implemented some patches, significant security risks remain.

French University Offers 'Safe Haven' for US Scientists

2025-07-02
French University Offers 'Safe Haven' for US Scientists

Amidst a deteriorating academic environment in the US, Aix-Marseille University (AMU) in France has launched a 'Safe Place for Science' program to attract researchers from top US universities. The program offers salaries comparable to French researchers, but concerns remain among some US applicants due to lower research funding and salaries in France compared to the US. However, the lower stress, lower cost of living, and free education for children are enticing factors. The program has already secured €15 million in funding and is seeking matching funds from the French government to expand the initiative.

Breaking Through: Open-Source Toolchain for Fuzzing Qualcomm Hexagon Basebands

2025-07-02
Breaking Through: Open-Source Toolchain for Fuzzing Qualcomm Hexagon Basebands

Qualcomm's proprietary Hexagon baseband architecture has hindered security research due to a lack of suitable tooling. This paper introduces the first open-source toolchain enabling full-system emulated fuzzing of Hexagon firmware. Leveraging a QEMU fork with Hexagon support and LibAFL, this toolchain addresses the gap in analyzing Hexagon basebands. Researchers can now perform coverage-guided fuzzing and utilize visualization tools to improve reverse engineering. This significantly advances Hexagon baseband security analysis, opening up new avenues for research and enhancing the security of billions of devices.

China's Hypersonic Feitian-2 Achieves Mach 12 Flight, Defying US Sanctions

2025-07-02
China's Hypersonic Feitian-2 Achieves Mach 12 Flight, Defying US Sanctions

Northwestern Polytechnical University in China successfully test-flew its hypersonic vehicle, Feitian-2, reaching Mach 12. The feat involved autonomously transitioning between rocket and ramjet propulsion, a significant technological hurdle. This achievement underscores China's advancements in hypersonic technology, directly challenging US dominance in the field. The US has been actively monitoring and attempting to restrict China's access to technologies related to hypersonic weapons. Feitian-2's success demonstrates China's ability to overcome technological sanctions and potentially reshape the global military landscape.

Tech Hypersonic

Suspended IT Worker Jailed for Network Sabotage

2025-07-02
Suspended IT Worker Jailed for Network Sabotage

A disgruntled IT worker, Mohammed Umar Taj, was sentenced to over seven months in prison for sabotaging his employer's network after being suspended. He altered login credentials and multi-factor authentication settings, locking out the company and its clients in Germany and Bahrain, causing an estimated £200,000 in damages. Police stated Taj sought revenge, causing international disruption. Ironically, he's currently listed as director of an electrical company. The case highlights the need for companies to swiftly revoke network access for suspended employees with privileged access.

Tech IT crime

AT&T Launches Account Lock to Combat SIM Swapping

2025-07-02
AT&T Launches Account Lock to Combat SIM Swapping

AT&T has introduced a new Account Lock feature to protect wireless users from SIM swapping attacks. Enabled through the myAT&T app, it prevents unauthorized changes like phone number transfers, SIM card replacements, and billing updates. SIM swapping, a growing threat, involves attackers obtaining a victim's phone number (often via social engineering) to intercept messages and calls, including two-factor authentication codes. This follows similar features already offered by T-Mobile, Verizon, and Google Fi. AT&T's Account Lock also blocks device upgrades and changes to authorized users and phone numbers.

Tech

Amazon Hits 1 Million Robots in Warehouses, Leverages AI for Efficiency Boost

2025-07-02
Amazon Hits 1 Million Robots in Warehouses, Leverages AI for Efficiency Boost

Amazon announced a major milestone: it now has one million robots in its warehouses, with the latest addition deployed in Japan. This signifies a massive leap in Amazon's warehouse automation efforts, bringing its robot workforce close to equaling its human workforce. To further enhance efficiency, Amazon unveiled DeepFleet, a new AI model designed to optimize robot routing, promising a 10% increase in robotic fleet speed. Furthermore, Amazon developed the Vulcan robot, equipped with tactile sensors for more precise item handling. These advancements highlight Amazon's continuous investment in automation and its technological leadership in logistics.

Tech

Xerox's $1.5B Gamble: Acquiring Lexmark in a Shrinking Print Market

2025-07-02
Xerox's $1.5B Gamble: Acquiring Lexmark in a Shrinking Print Market

In a surprising move, Xerox has acquired Lexmark for $1.5 billion, a deal that includes debt and liabilities. This acquisition pulls Lexmark from Chinese ownership and into a restructured Xerox, positioning the company as a top player in print services. However, in a world increasingly dominated by digital workflows, Xerox's bet on the declining print market is a risky one. While Lexmark brings a strong global presence and managed services business, the success of this merger hinges on the continued relevance of paper documents in industries like healthcare and finance. It's a bold gamble in a fading industry, a fight for dominance in the remaining enterprise printing sector.

Tech M&A

Apple Sues Ex-Employee for Stealing Vision Pro Secrets

2025-07-02
Apple Sues Ex-Employee for Stealing Vision Pro Secrets

Apple is suing former Vision Pro product design engineer Di Liu for allegedly stealing confidential files related to Apple's augmented reality headset and giving them to Snap. Liu claimed he left Apple for family and health reasons, but had already accepted a job at Snap two weeks prior. Apple discovered Liu copied thousands of files, including confidential product code names, to his personal cloud storage and deleted files to cover his tracks. Apple is seeking the return of the stolen data and damages.

Laptop Mag Shuts Down After 35 Years

2025-07-02
Laptop Mag Shuts Down After 35 Years

Laptop Mag, a long-standing laptop and technology review website, has ceased operations after nearly 35 years. Its parent company, Future PLC, cited a strategic review as the reason for the closure. Starting as a print publication in 1991, Laptop Mag transitioned to a digital-only format in 2013. The shutdown follows the recent closure of AnandTech, also owned by Future PLC, raising concerns about the future of tech journalism and leaving the fate of Laptop Mag's archives uncertain.

Tech

Google's Data Center Energy Consumption Doubles, Leading to Massive Renewable Energy Investments

2025-07-02
Google's Data Center Energy Consumption Doubles, Leading to Massive Renewable Energy Investments

Google's latest sustainability report reveals a staggering increase in its data center electricity consumption, more than doubling in just four years to 30.8 million megawatt-hours. Data centers account for a whopping 95.8% of Google's total energy use. To meet its carbon-free pledge, Google is aggressively investing in geothermal, nuclear fusion, nuclear fission, and renewables, including large solar and wind power purchases and partnerships with startups developing advanced energy technologies. While Google has achieved its annual carbon-free energy matching goal, achieving 24/7 carbon-free energy remains a significant challenge, particularly in regions with less reliable power grids.

Tech

The Hoyle State: A Quantum Dance of Alpha Particles

2025-07-02
The Hoyle State: A Quantum Dance of Alpha Particles

This article explores the Hoyle state of carbon-12, an excited state with slightly higher energy than the ground state. This state can be visualized as a quantum mechanical 'dance' of three alpha particles (helium-4 nuclei), and its energy is remarkably close to the combined energy of a beryllium-8 nucleus and an alpha particle. The existence of the Hoyle state is crucial for carbon production in stars, leading to discussions about the abundance of carbon in the universe and the existence of life. However, the author argues that linking this to the 'anthropic principle' is unnecessary.

Australia Mandates Age Verification for Logged-in Search Engine Users

2025-07-02
Australia Mandates Age Verification for Logged-in Search Engine Users

Australia's new online safety code requires search engines like Google and Bing to implement age verification for logged-in users within six months. For users deemed to be under 18, safety settings will be maximized to filter out pornography and graphic violence. This move is part of a broader effort to protect children online, also addressing concerns about the harmful use of AI chatbots by minors.

Tech

arXivLabs: Experimenting with Community Collaboration

2025-07-02
arXivLabs: Experimenting with Community Collaboration

arXivLabs is a framework enabling collaborators to develop and share new arXiv features directly on the website. Individuals and organizations involved embrace arXiv's values of openness, community, excellence, and user data privacy. arXiv is committed to these values and only partners with those who share them. Got an idea for a project to enhance the arXiv community? Learn more about arXivLabs.

Tech

Fakespot, the Fake Review Detector, Shuts Down After Nine Years

2025-07-02

Fakespot, the AI-powered tool that helped millions identify fake online reviews, has officially shut down after nearly a decade. Acquired by Mozilla in 2023, the service was discontinued due to sustainability challenges. Born from founder Saoud Khalifah's frustration with deceptive Amazon reviews, Fakespot used AI to detect patterns in reviews with 90% accuracy. Despite securing funding and a Mozilla acquisition, the lack of a sustainable business model led to its closure, leaving users disappointed. Its demise highlights the persistent problem of fake reviews and the ongoing struggle for online authenticity.

AI-Powered Hives Combat Bee Colony Collapse

2025-07-01
AI-Powered Hives Combat Bee Colony Collapse

Facing a dramatic decline in bee populations, Beewise has developed BeeHome, an AI-powered robotic hive that monitors bee colony health in real-time. Using AI and robotics to automate disease treatment and environmental control, BeeHome significantly reduces colony losses. With hundreds of thousands of units deployed and substantial funding secured, Beewise aims to revolutionize beekeeping and safeguard global food security.

Apple Eyes Anthropic or OpenAI AI to Revamp Siri

2025-07-01
Apple Eyes Anthropic or OpenAI AI to Revamp Siri

Apple is reportedly considering using AI technology from Anthropic or OpenAI to power a new version of Siri, potentially sidelining its own in-house models. This move aims to revitalize Apple's lagging AI efforts. Discussions have included integrating the companies' large language models onto Apple's cloud infrastructure for testing.

Tech

Cartel Hacks FBI Agent's Phone: Ubiquitous Technical Surveillance Poses Existential Threat

2025-07-01
Cartel Hacks FBI Agent's Phone: Ubiquitous Technical Surveillance Poses Existential Threat

The Sinaloa drug cartel hacked the phone of an FBI official investigating El Chapo, accessing call logs, geolocation data, and even using Mexico City's camera system to track the agent's movements. A Justice Department report reveals this as an example of the growing threat of "ubiquitous technical surveillance" (UTS), exacerbated by readily available hacking and surveillance tools. This poses an "existential" threat to law enforcement, as highlighted by the report which details another case where an organized crime boss searched an employee's phone records to identify potential informants. The sophistication of these attacks and ease of access to tools make this an increasingly dangerous trend.

Remembering Jim Boddie, Pioneer of the Single-Chip DSP

2025-07-01
Remembering Jim Boddie, Pioneer of the Single-Chip DSP

James R. "Jim" Boddie, a pioneer of the programmable, single-chip digital signal processor (DSP), passed away on December 2nd at age 74. While at AT&T Bell Labs, he led the development of one of the industry's first successful DSPs, the DSP1, and subsequently five generations of DSPs, enabling countless applications from massive telephone switching systems to tiny hearing aids. His contributions extended beyond technology, encompassing exceptional team leadership; he was a recipient of the IEEE Liebmann Award. Even in retirement, he created a 3D virtual tour of the Alamo. His legacy of innovation will continue to inspire.

The Hype vs. Reality of Commercial Spaceflight: A Sobering Look at Recent Failures

2025-07-01
The Hype vs. Reality of Commercial Spaceflight: A Sobering Look at Recent Failures

Recent setbacks in space exploration, including iSpace's two failed lunar landing attempts and SpaceX's Starship program struggles, highlight a critical issue: the disconnect between the hype surrounding commercial spaceflight and the harsh reality of its technical challenges. The author argues this isn't merely a series of isolated incidents, but rather a systemic problem stemming from unrealistic expectations, opaque cost structures, and a culture that prioritizes marketing over sound engineering. Drawing parallels to the meticulous approach of the Apollo era, the article criticizes companies for framing failures as 'learning opportunities' while glossing over fundamental flaws. It concludes with a call for greater accountability and a focus on verifiable progress, urging the industry to move beyond flashy pronouncements and deliver tangible results.

WordPress Founder Matt Mullenweg on 20 Years of Automattic and the AI Revolution

2025-07-01
WordPress Founder Matt Mullenweg on 20 Years of Automattic and the AI Revolution

In a wide-ranging interview on the Decoder podcast, Automattic founder Matt Mullenweg reflects on two decades of WordPress and the controversies surrounding its open-source ecosystem. He discusses the legal battle with WP Engine, Automattic's response to the AI boom's impact on websites, and his vision for new products like Beeper. Mullenweg expresses optimism about AI's future, believing it won't destroy the web but rather create new opportunities. The conversation also touches upon Automattic's organizational restructuring and its commitment to the open web.

Tech

6GHz Spectrum: Wi-Fi's Future or the Next Auction Target?

2025-07-01
6GHz Spectrum: Wi-Fi's Future or the Next Auction Target?

The FCC's consideration of reallocating the 6GHz spectrum has sparked a debate about the future of Wi-Fi and spectrum auctions. Experts highlight the crucial role of 6GHz for Wi-Fi, promising significant speed and capacity improvements, supporting emerging applications like VR. However, this spectrum faces competition from satellite and mobile operators, with FCC Chairman Brendan Carr leaning toward allocating more frequencies to mobile carriers. With 6GHz Wi-Fi deployments just beginning, it's a prime target for reallocation, potentially impacting Wi-Fi's future significantly.

VP.net: A 'Zero Trust' VPN Leveraging Intel SGX

2025-07-01

VP.net is a novel VPN service promising 'cryptographically verifiable privacy' through Intel SGX technology. Unlike traditional VPNs relying on user trust, VP.net uses SGX enclaves to create secure, isolated environments, preventing even the provider from tracking user activity. While not foolproof, its 'zero trust' approach, open-source code, and remote attestation mechanism offer a fresh perspective on VPN security and privacy.

Tech

Automattic Halts Tumblr's Migration to WordPress

2025-07-01
Automattic Halts Tumblr's Migration to WordPress

Automattic CEO Matt Mullenweg announced that the plan to migrate Tumblr's backend to WordPress is on hold. The plan, announced last year to simplify cross-platform sharing for Tumblr's half-billion blogs, is being paused to prioritize user-facing improvements. While the migration is currently stalled, Mullenweg hasn't ruled it out entirely. This also means Tumblr posts won't be readily available on the fediverse in the near future. While WordPress.com has an ActivityPub plugin, migrating Tumblr to WordPress would have provided a simpler path to fediverse integration. For now, Automattic plans to implement fediverse support directly within the Tumblr codebase.

Tech

Oracle Lands $30 Billion Cloud Deal, Sends Shares Soaring

2025-07-01
Oracle Lands $30 Billion Cloud Deal, Sends Shares Soaring

Oracle Corp. announced a massive cloud computing deal worth $30 billion in annual revenue, more than double the size of its current cloud infrastructure business. The deal, expected to begin generating revenue in fiscal year 2028, is one of the largest cloud contracts ever recorded and hasn't yet named the client. This significant win positions Oracle for substantial growth in the cloud market, driving a surge in its stock price. The deal highlights the booming demand for cloud services and AI, with Oracle strategically expanding its market share.

Tech

Windows User Base Shrinks by 400 Million: A Giant Faces Challenges

2025-07-01
Windows User Base Shrinks by 400 Million: A Giant Faces Challenges

Microsoft executives admit that the number of active Windows devices is lower than expected, with a decrease of around 400 million in the past three years. This is not simply a matter of Windows 10/11 upgrades, but a trend of users switching to smartphones and tablets, as well as alternatives like Chromebooks. While enterprise users may upgrade due to security concerns, ordinary consumers are less willing to update their systems. Apple's Mac market share is also declining, but its cost-effectiveness and portability still pose a threat to Windows. The prevalence of free online applications like Google Docs has also reduced consumer reliance on Windows, and Microsoft faces significant market challenges.

NASA Launches on Netflix: Space Exploration Goes Mainstream

2025-07-01
NASA Launches on Netflix: Space Exploration Goes Mainstream

NASA is bringing its live rocket launches, astronaut spacewalks, and stunning Earth views to Netflix this summer via NASA+. This move aims to reach a vastly larger audience than its current app and website, leveraging Netflix's 700+ million subscribers to spark interest in space exploration. By making space exploration readily accessible on a popular streaming platform, NASA hopes to inspire a new generation and further its educational mission.

Tech
1 2 11 12 13 15 17 18 19 163 164