Category: Tech

Sony Xperia: Small but Significant

2025-08-08
Sony Xperia: Small but Significant

Despite holding a minuscule share of the global smartphone market and facing uncertainty about its future, Sony maintains that its Xperia brand is “very important” and will continue to be nurtured. Sony CFO Lin Tao recently reiterated this commitment, acknowledging Xperia's place within a crucial business segment. While Sony has scaled back its presence in the US market, lost ground in Japan and Europe, and even ceased manufacturing its own devices, it insists on continuing its smartphone efforts. The company emphasizes the broader significance of communication technology within Sony's long-term strategy, extending beyond smartphones themselves.

Tech

China's Solar Industry Meltdown: Mass Layoffs and Overcapacity

2025-08-08

China's solar industry is facing a brutal downturn, with leading companies laying off nearly a third of their workforce last year. This reveals a crisis of overcapacity and vicious price wars, fueled by previous government-led expansion. While the government is attempting intervention, local resistance and corporate foot-dragging hinder solutions. This highlights the risks of central planning and foreshadows potential issues in other Chinese industries.

Linux Desktop Market Share Surges Past 6%: AI's Rising Influence?

2025-08-08
Linux Desktop Market Share Surges Past 6%: AI's Rising Influence?

Lansweeper's analysis of over 15 million systems reveals Linux desktop OS market share exceeding 6%, a new high. This growth is particularly pronounced in the consumer PC market, contrasting with a lower 1.9% share in business environments. New devices show a stronger preference for Linux, and European adoption surpasses North America's. The rise of AI development is cited as a key driver, with Linux becoming the default for AI and machine learning workloads. While unlikely to match macOS's mainstream appeal, Linux has solidified its position as a significant player for power users and developers.

Tech Desktop OS

HBO Max to Crack Down on Password Sharing

2025-08-08
HBO Max to Crack Down on Password Sharing

Warner Bros. Discovery (WBD) is getting aggressive in its efforts to curb password sharing on HBO Max. The company's head of streaming and gaming announced plans to close loopholes by the end of 2025, impacting financials starting in 2026. Following Netflix's lead, WBD aims to significantly boost revenue by cracking down on this practice. Months of testing to identify legitimate users precede a tougher stance, with more forceful measures rolling out in Q4. Despite this, HBO Max added 3.4 million streaming subscribers this quarter, reaching a total of 125.7 million.

The AI Economy: A Bifurcated US?

2025-08-08
The AI Economy: A Bifurcated US?

The US economy is split: a booming AI economy versus a sluggish consumer economy. AI-related companies have driven stock market growth, fueled by massive investments in infrastructure by tech giants – perhaps the biggest tech project since the 1960s. While the productivity boost from AI is debated, its rapid adoption is undeniable, particularly in information services and management. The long-term effects remain uncertain, but AI's impact on the US economy and job market is already evident.

Tech AI economy

Flipper Zero Firmware Bypasses Car Security: Single Button Press Unlock

2025-08-08

YouTube channel Talking Sasquach demonstrated a custom Flipper Zero firmware that breaks the rolling code security of many modern vehicles. The attack requires only a single button-press recording from the key fob to replicate all functions, including unlocking doors and trunks, rendering the original key fob unusable. Affected brands include Chrysler, Dodge, Fiat, Ford, Hyundai, Jeep, Kia, Mitsubishi, and Subaru. Currently, there's no easy fix, potentially requiring mass vehicle recalls. The attack's mechanism might involve reverse-engineering the rolling code sequence or a 'RollBack' attack that resets synchronization by replaying captured codes in a specific order.

Critical Flaw Found in Widely Used TETRA Encryption

2025-08-07
Critical Flaw Found in Widely Used TETRA Encryption

Researchers have uncovered critical vulnerabilities in the encryption algorithms used in TETRA radio systems, widely adopted by police and military forces globally. The study reveals that TEA1, one of the TETRA standard's encryption algorithms, has a key reduction vulnerability, weakening it to a mere 32 bits and making it crackable in under a minute. Furthermore, flaws in the end-to-end encryption (E2EE) implementation reduce the key size to 56 bits, potentially allowing interception of voice and data communications. These vulnerabilities affect numerous users employing the TCCA E2EE scheme, including law enforcement and military agencies across Europe, the Middle East, and beyond. While some algorithms have geographical usage restrictions, TEA1 is also used in critical infrastructure in the US and elsewhere. The findings highlight significant global communication security risks and necessitate urgent security updates to TETRA systems.

Tech

Trump's Trade Delusions: The 15% Tariff and the Bigger Danger

2025-08-07
Trump's Trade Delusions: The 15% Tariff and the Bigger Danger

Trump claims the EU pledged a $600 billion “gift” for his discretionary investment. This is a delusion; the EU made no such commitment. Despite this, Trump threatens to raise tariffs on the EU to 35%. While this would harm the EU, the impact may be less than anticipated due to the EU's relatively low dependence on the US market and its adjustments to existing tariffs. However, the underlying hubris and miscalculation in Trump's trade policy pose a far greater concern.

Tech

AI Surveillance in Schools: A 13-Year-Old's Joke Leads to Arrest, Sparking Debate

2025-08-07
AI Surveillance in Schools:  A 13-Year-Old's Joke Leads to Arrest, Sparking Debate

A 13-year-old girl's arrest for an online joke highlights the controversial use of AI-powered surveillance software in schools. The software, designed to detect threats, flagged an innocuous comment as a violent threat, leading to interrogation, a strip search, and jail time. While educators claim the technology saves lives, critics argue it criminalizes careless words and disproportionately impacts teenagers. High false alarm rates and numerous lawsuits underscore the ethical dilemmas of using AI in schools, raising questions about balancing safety with student rights and well-being.

PCIe 8.0: Double the Speed, Powering AI and Quantum Computing

2025-08-07
PCIe 8.0: Double the Speed, Powering AI and Quantum Computing

PCI-SIG announced that the PCIe 8.0 specification, targeting a 2028 release, will boast a raw bit rate of 256 GT/s—double that of PCIe 7.0. This translates to a potential 1 TB/s bidirectional throughput in a full x16 configuration. Designed to handle the massive data demands of AI, machine learning, edge computing, and even quantum systems, PCIe 8.0 also focuses on improved protocol efficiency, reduced power consumption, and backward compatibility. Its applications span high-performance computing, hyperscale data centers, aerospace, and automotive industries.

Tech

HeH+ Reaction Rate in Early Universe Challenges Previous Theories

2025-08-07
HeH+ Reaction Rate in Early Universe Challenges Previous Theories

Researchers at the Max Planck Institute for Nuclear Physics have recreated the reaction of HeH+ with deuterium under early universe conditions using the Cryogenic Storage Ring (CSR). Contrary to previous predictions, the reaction rate remains nearly constant at low temperatures, implying a much greater role for HeH+ and H2 in the formation of the first stars than previously thought. This finding revises our understanding of early universe chemistry and significantly advances our knowledge of early star formation.

Microsoft Azure Implicated in Massive Surveillance of Palestinians

2025-08-07
Microsoft Azure Implicated in Massive Surveillance of Palestinians

Reports from The Guardian and other outlets reveal that Israel has been using Microsoft Azure cloud servers to store millions of recorded phone calls from Palestinians in Gaza and the West Bank since 2022. This data, allegedly accessed by Israel's Unit 8200, has been used to inform military operations, including targeting for airstrikes. Microsoft CEO Satya Nadella reportedly approved a customized system for this purpose. The revelation has sparked outrage, with critics accusing Microsoft of complicity in potential war crimes. While Microsoft denies knowledge, evidence suggests otherwise, raising serious ethical questions about the company's role.

Tech

Commodore Amiga's 40th Anniversary: The Rise and Fall of a Legendary Computer

2025-08-07
Commodore Amiga's 40th Anniversary: The Rise and Fall of a Legendary Computer

Forty years ago, in July 1985, the Commodore Amiga was launched, taking the computing world by storm. This article recounts the Amiga's incredible journey: from the vision of Atari engineer Jay Miner, through the struggles of Hi-Toro (later Amiga), to its acquisition by Commodore and eventual demise. Known for its advanced graphics and multitasking capabilities, the Amiga faced challenges due to its high price and design flaws. While ultimately losing out to the Atari ST in market share, the Amiga left an indelible mark on computing history, its influence still felt today.

Tech

Nine Zero-Days in HashiCorp Vault: The Trust Model Broken

2025-08-07
Nine Zero-Days in HashiCorp Vault: The Trust Model Broken

Cyata's research team uncovered nine previously unknown zero-day vulnerabilities in HashiCorp Vault, bypassing lockouts, evading policy checks, and enabling impersonation. One vulnerability allows root privilege escalation, and another—perhaps most concerning—leads to the first publicly reported remote code execution (RCE) in Vault, enabling complete system takeover. These flaws weren't memory corruption or race conditions, but subtle logic flaws buried in Vault's authentication, identity, and policy enforcement layers; some existed for nearly a decade. Researchers found them by meticulously examining Vault's core request flow, specifically the request_handling.go file. These vulnerabilities impact both open-source and enterprise Vault versions, allowing attackers to bypass multi-factor authentication (MFA), impersonate entities, and achieve RCE. The research highlights the potential impact of subtle logic flaws in software critical to infrastructure security.

Tech

Google Search's AI Upgrade: Stable Traffic, New Opportunities for Websites

2025-08-07
Google Search's AI Upgrade: Stable Traffic, New Opportunities for Websites

Since integrating AI features, Google Search has seen relatively stable overall traffic, with a slight increase in high-quality clicks. While some sites may experience decreased traffic, this is largely due to shifting user preferences toward websites offering diverse content like forums, videos, and podcasts, as well as in-depth analysis and unique perspectives. Google's AI-powered Search aims to highlight, not replace, web content. It directs users to relevant sites using links and citations, respecting open web protocols. Google believes AI will create many opportunities, helping businesses and creators reach broader audiences.

Citizen Lab Director Warns of Tech-Fascism Fusion, Calls on Cybersecurity Community to Act

2025-08-07
Citizen Lab Director Warns of Tech-Fascism Fusion, Calls on Cybersecurity Community to Act

Ron Deibert, director of Citizen Lab, issued a stark warning at Black Hat, highlighting a growing fusion of technology and fascism, with Big Tech playing a significant role. He urged the cybersecurity community to address this challenge, preventing complicity in human rights abuses. Deibert linked recent political events in the US to a worrying slide towards authoritarianism, arguing the cybersecurity community has a responsibility to help counter this trend. He expressed concern that major tech companies might cut threat intelligence teams, weakening defenses against government spyware and severely impacting global civil society.

Lithium Deficiency Could Be a Key Driver of Alzheimer's, Study Suggests

2025-08-07
Lithium Deficiency Could Be a Key Driver of Alzheimer's, Study Suggests

A new study reveals that individuals with Alzheimer's disease exhibit lower brain lithium levels. Experiments with mice showed that supplementing lithium reversed cognitive decline in animals with Alzheimer's-like symptoms. Analysis of brain tissue from 285 deceased individuals revealed a 36% lower lithium concentration in the prefrontal cortex of Alzheimer's patients compared to those without cognitive impairment. Interestingly, amyloid plaques in Alzheimer's brains contained significantly higher lithium levels than plaque-free regions. Further research using lithium-deficient mice demonstrated impaired memory, increased brain inflammation, and reduced amyloid plaque clearance. However, treatment with low-dose lithium, particularly lithium orotate, improved memory and reduced plaque buildup in these mice. While promising, clinical trials are necessary to validate the safety and efficacy of low-dose lithium orotate as a potential Alzheimer's treatment.

Room-Temperature High-Purity Quantum State Achieved: A Breakthrough in Quantum Sensing

2025-08-07
Room-Temperature High-Purity Quantum State Achieved: A Breakthrough in Quantum Sensing

Researchers at ETH Zurich have achieved a breakthrough in quantum sensing by levitating three nanometer glass spheres using optical tweezers at room temperature. Remarkably, 92% of the spheres' motion was attributed to quantum effects, eliminating the need for extremely low temperatures typically required for observing quantum phenomena. This high-purity quantum state opens doors for developing quantum sensors for applications such as medical imaging and highly precise navigation systems.

Tech

Multics: A Resurrected OS History

2025-08-07

The Multics website preserves the technical achievements and history of the Multics operating system. It aims to prevent the loss of valuable technical knowledge and historical context, giving credit where it's due and remembering the people involved. The site contains hundreds of files and images and welcomes contributions from anyone with corrections, anecdotes, or pictures.

FDA Approves First-of-Its-Kind Eye Drops for Presbyopia

2025-08-07
FDA Approves First-of-Its-Kind Eye Drops for Presbyopia

LENZ Therapeutics' VIZZ, an aceclidine-based eye drop, has received FDA approval for the treatment of presbyopia. This innovative treatment shrinks the pupil, creating a 'pinhole effect' that improves near vision for up to 10 hours without significantly affecting distance vision or causing side effects like those seen with previous treatments. Expected to launch in Q4 2025, VIZZ offers a groundbreaking solution for the millions suffering from age-related blurry near vision.

Compaq vs. IBM: The Battle for the Soul of the PC

2025-08-07
Compaq vs. IBM: The Battle for the Soul of the PC

This article recounts Compaq's daring challenge to IBM's PC monopoly in the 1980s. CEO Rod Canion's decision to embrace open standards and share technology with competitors—essentially giving away 'the company jewels'—preserved innovation. Canion's leadership fostered a beloved workplace culture and provided the foundation to confront the industry giant. The article explores how a different outcome could have drastically altered the technological landscape we know today.

Tech PC History

Critical Vulnerabilities Found in Secrets Management Vaults

2025-08-07
Critical Vulnerabilities Found in Secrets Management Vaults

Researchers discovered subtle logic flaws in HashiCorp Vault and CyberArk Conjur, allowing attackers to bypass authentication, evade policy checks, and impersonate accounts. These vaults, storing credentials governing access to systems and data, are the backbone of digital infrastructure. Compromise means complete infrastructure loss. The vulnerabilities, responsibly disclosed and now patched, highlight the critical need for robust secrets management and access control.

What if Bytes Were 9 Bits?

2025-08-07

This article explores a fascinating counterfactual: what if computing systems had used 9-bit bytes instead of 8? The author argues this would have solved numerous problems plaguing modern computer science, such as IPv4 address exhaustion, the Y2038 problem, and Unicode limitations. While 9-bit bytes would present challenges, such as handling TCP sequence numbers, the author suggests these are surmountable, with benefits outweighing costs. The article is full of intriguing speculation on historical events and technological developments, making for a compelling read.

One-Time Passcodes: Worse Than Passwords?

2025-08-07

Many services use a flawed login method: sending a 6-digit code via email or phone. This is incredibly insecure. Attackers can easily create phishing sites to trick users into entering codes, stealing accounts. Password managers offer no protection. Microsoft's Minecraft login, using this method, has already suffered numerous account thefts. Stop using this insecure login system!

Tech

Project Hyperion: Winning Designs for a 250-Year Interstellar Voyage

2025-08-07

The Initiative for Interstellar Studies (i4is) has announced the winners of its Project Hyperion design competition. The challenge tasked interdisciplinary teams with designing a generation ship for a 250-year journey to a habitable exoplanet. Winning designs focused on creating a self-sustaining ecosystem capable of supporting 1000±500 people for centuries, addressing challenges like artificial gravity, resource management, and cultural preservation. This competition highlights the crucial role of interdisciplinary collaboration in tackling the complexities of interstellar travel.

AirGradient ONE: A Small Company's Fight Against a Flawed Tech Review

2025-08-06
AirGradient ONE: A Small Company's Fight Against a Flawed Tech Review

AirGradient, a small company known for its open-source air quality monitor, the AirGradient ONE, found itself unfairly labeled "Not Recommended" by WIRED magazine due to a single hardware failure on the review unit. This, despite the device's recognition in rigorous scientific evaluations and its popularity among users. The founder argues the review lacked objective methodology, comparing inconsistent judgments across different monitors. The article calls for greater transparency and rigor in tech journalism, highlighting how flawed reviews harm both manufacturers and consumers who rely on them for accurate product information, especially in health-related areas like air quality monitoring.

Japan's New Law Challenges Apple's iOS Browser Monopoly

2025-08-06
Japan's New Law Challenges Apple's iOS Browser Monopoly

Japan's newly enacted Smartphone Act prohibits Apple's long-standing ban on third-party browser engines on iOS, mandating that Apple allow browsers like Firefox and Chrome to use their own engines instead of forcing them to use WebKit. This legislation aims to foster browser competition on iOS and ensure web apps have access to the APIs and performance needed to compete with native apps. The act also requires fair access to functionally equivalent OS APIs and a choice screen for browsers promptly after first activation. While the act is expected to take effect by December 2025, enforcement is likely to be a lengthy and complex process.

Tech

P vs NP Claim Debunked: Springer Journal Publishes Flawed Paper

2025-08-06

A paper claiming to prove a result stronger than P≠NP was published in Springer Nature's Frontiers of Computer Science, sparking controversy. One of the authors is a deputy editor-in-chief of the journal. Computer scientists Ryan Williams and Eric Allender found serious flaws in the proof, even contradicting known algorithms. They submitted a comment requesting retraction, but the editor-in-chief refused, only agreeing to publish a revised version of their comment. This incident exposes severe problems in the journal's peer-review process, raising concerns about the journal's reputation. This is a Tech news story.

Tech

GAO Slams Federal Agencies for Cybersecurity Failures

2025-08-06
GAO Slams Federal Agencies for Cybersecurity Failures

The Government Accountability Office (GAO) issued scathing reports criticizing three federal agencies—the General Services Administration (GSA), Environmental Protection Agency (EPA), and Department of Homeland Security (DHS)—for their CIOs' failure to implement cybersecurity recommendations. DHS has 43 outstanding recommendations, seven prioritized by GAO; EPA has 11; and GSA has 4. Common failures include inadequate cybersecurity event logging and IT portfolio reviews. The EPA faces additional issues with cloud software management, lacking documentation and service level agreements. DHS's Homeland Advanced Recognition Technology (HART) program remains plagued with problems, with all nine recommendations unimplemented. The GAO hopes newly appointed CIOs will address these shortcomings, and has brought the issues to Congress's attention.

PLOS ONE Retractions: 45 Editors Linked to Over 30% of Retracted Papers

2025-08-06
PLOS ONE Retractions: 45 Editors Linked to Over 30% of Retracted Papers

A study in PNAS reveals a shocking pattern of misconduct at PLOS ONE. 45 editors, responsible for only 1.3% of published articles, were linked to over 30% of the journal's 702 retractions by early 2024. Twenty-five of these editors even authored retracted papers themselves. The research suggests a coordinated network potentially involving paper mills, highlighting systemic flaws in peer review. Specific editors, like Shahid Farooq (52 out of 79 edited papers retracted), demonstrate exceptionally high retraction rates. PLOS acknowledges the issue and states it has taken action, but the incident underscores the vulnerabilities of open-access journals to manipulation.

1 2 14 15 16 18 20 21 22 184 185