35+ best products we tested in 2025: Expert picks for phones, TVs, AI, and more
After a year of reviewing the top hardware and software, here’s ZDNET’s list of 2025 winners.READ MORE HERE…
The team behind ZorinOS has released the beta version of the open-source operating system, and it’s not only stunning but also more user-friendly.READ MORE HERE…
Read MoreAirport staff revert to manual ops as travellers urged to use self-service check-in where possible The EU’s cybersecurity agency today confirmed that ransonmware is the cause of continued disruption blighting major airports across Europe.… READ MORE HERE…
Read MorePLUS: Luxury brands under fire; FBI warns crims are spoofing it again; ICE buys phone cracking software Infosec in brief Online criminals prefer to deal in digital assets, but a side effect of a ransomware attack has seen a French museum robbed of $705,000 in physical gold nuggets.… READ MORE HERE…
Read MoreWith a color display, a neural wristband, and new capabilities, the Meta Ray-Bans Display are the most advanced smart glasses consumers can buy – for now.READ MORE HERE…
Read MoreWith a capacity of 300Wh, the EcoFlow Trail 300 DC is powerful enough to power multiple devices yet light enough for even the youngest family members to carry.READ MORE HERE…
Read MoreWith Apple’s big upgrade to the base iPhone 17, its redesign of the two Pro models, and the launch of iPhone Air, this might be the toughest year ever to pick the right device for you. But I’ve got recommendations.READ MORE HERE…
Read MoreThe iPhone Air may not win over camera enthusiasts, but its ultra-thin design and well-rounded features make it a solid pick for the adventurous.READ MORE HERE…
Read MoreWhen a clickjack attack managed to hijack a passkey authentication ceremony, were password managers really to blame? ZDNET’s investigation reveals a more complicated answer.READ MORE HERE…
Read MoreCould this bot-prevention technique now be obsolete? ChatGPT can be tricked via cleverly worded prompts to violate its own policies and solve CAPTCHA puzzles, potentially making this human-proving security mechanism obsolete, researchers say.… READ MORE HERE…
Read MoreUnnamed org compromised with two malware sets An unknown attacker has abused a couple of flaws in Ivanti Endpoint Manager Mobile (EPMM) and deployed two sets of malware against an unnamed organization, according to the US Cybersecurity and Infrastructure Security Agency.… READ MORE HERE…
Read More