The lawsuit is the fourth legal challenge against Trump's executive order on voting. The attorneys general argue the order is "an unconstitutional attempt to seize control of elections."
(Image credit: Joseph Prezioso)
Whatever you think of President Trump's tariffs, there's one point you have to concede: his interest in them is not a passing whim.
He noted that on Wednesday, in the Rose Garden, when he was announcing the latest, massive round of tariffs. "I've been talking about this for 40 years," he said.
The use of tariffs are a core belief for Donald Trump. Trade deficits are bad, other countries take advantage of the U.S. and tariffs are the way to fix this.
Since the Rose Garden announcement, markets have plunged, other countries have promised to retaliate, and members of his own party have spoken out against the tariffs.
Trump's tariff plan is designed to eliminate U.S. trade deficits. Are trade deficits actually bad?
For sponsor-free episodes of Consider This, sign up for Consider This+ via Apple Podcasts or at plus.npr.org.
Email us at considerthis@npr.org.
(Image credit: BRENDAN SMIALOWSKI)
A visit by a senior Kremlin envoy to the White House this week may help explain why Russia is not on President Trump's tariffs list - and determine for just how long Russia can stay off the list.
(Image credit: Alexander Nemenov)
U.S. District Judge James Boasberg Thursday pushed, once again, the Justice Department to explain its use of the Alien Enemies Act and provide key details and the timeline of the flights.
(Image credit: DREW ANGERER)
Federal health agencies have to slash their spending on contracts by more than a third, on top of the 10,000-person staffing cuts which started this week.
(Image credit: Alex Brandon)
The world is reacting to President Trump's announcement of new tariffs on nearly every country on the planet. The move is meant to re-shape the global trading order and some countries are being hit harder than others. NPR correspondents around the world are hearing anger, dismay, threats of retaliation and bewilderment.
If you want to add some extra security to your car or keep a record of what’s happening on the road while you drive, then you’ve probably thought about picking up one of the best dash cams. But you might soon be able to rely just on your car’s in-built cameras and Android Auto to do the job.
That’s because Google has recently rolled out a new free Dashcam App via Android Auto, which car manufacturers can easily integrate into the services their vehicles offer (spotted by Android Authority).
A few cars already include dash cam services using their cameras, but these had to be designed by each car maker.
With Google offering this generic service via Android Auto, many drivers are hoping – us included – that manufacturers yet to add this kind of service to their vehicles finally will because Google has made the process much simpler for them.
With Android Auto you may no longer need a dash cam (Image credit: Future)The documentation Google has released is quite in-depth because it’s aimed at software developers looking to adapt its app to fit their vehicles, so we’ve parsed through it and picked some highlights.
For example, the app recommends you use external storage to keep video recordings so you don’t instantly fill your car’s internal storage. We also know that the dash cam service will start automatically when it detects certain triggers, like driving over a certain speed. These customization options potentially let you design your ideal dash cam setup depending on your needs.
Developers can also set up options for notifications, limits on how long files will be stored for before being deleted, and a ‘streaming_module’ reference has us thinking you might be able to remotely view your car’s dash cam clips remotely from another device.
Android Auto already has plenty of useful tools (Image credit: Google Play)Now, Google’s Android Auto app system isn’t quite as perfect as an actual dash cam.
For one, this new system will only work if your car has cameras, and if it does, the cameras don’t usually look at what’s happening inside the car – something you can get from dash cams.
For another, you can’t simply install Android Auto’s dash cam today – you’ll have to wait for your vehicle to get support for it in an update.
But as more vehicles boast cameras to help with parking, basic self-driving capabilities, road sign detection, and other driver-assistance features, this Android Auto update will be a big upgrade for many of our cars and could quickly become one of Android Auto’s best features.
You might also likeR.E.M. played its first concert there in 1980 and still draws fans to its hometown. A visit to Athens can be like a pilgrimage of the band's music.
(Image credit: Melanie Peeples)
At least one in every five phishing emails carries a .PDF attachment, researchers are saying, warning that the popular file format is being increasingly used in social engineering attacks.
A new report from Check Point Research claims PDF-based attacks now account for 22% of all malicious email attachments, making them particularly concerning for businesses sharing large quantities of these files every day.
In earlier years, many of the attacks relied on JavaScript or other dynamic content being embedded within the files. While this approach is still seen in the wild, it has become less common, since JavaScript-based attacks tend to be “noisy” and easier to detect by security solutions.
Email remains one of the most popular attack vectors out there, with more than two-thirds (68%) of cyberattacks beginning this way.
Monitor your credit score with TransUnion starting at $29.95/month
TransUnion is a credit monitoring service that helps you stay on top of your financial health. With real-time alerts, credit score tracking, and identity theft protection, it ensures you never miss important changes. You'll benefit from a customizable online interface with clear insights into your credit profile. Businesses also benefit from TransUnion’s advanced risk assessment tools.
Preferred partner (What does this mean?)View Deal
Customizing the linkToday, cybercriminals are pivoting towards a simpler, more effective approach, Check Point says - social engineering.
Generally speaking, the attacks don’t differ much from your usual phishing email. The PDF attachment would serve as a launch pad, often carrying a link that would redirect a person to a malicious landing page or a website hosting malware.
That way, the malicious links are hidden from security filters, making sure the files are received straight to the inbox.
Furthermore, placing the link in a PDF gives the attackers full control - they can change the text, the image, or any other aspect of the link, making it more trustworthy.
The files are often designed to mimic trusted brands like Amazon, DocuSign, or Acrobat Reader.
“Even though these attacks involve human interaction (the victim must click the link), this is often an advantage for attackers, as sandboxes and automated detection systems struggle with tasks that require human decision-making,” Check Point concluded.
You might also likeThe announcement comes after lawmakers voiced concern about whether top national security officials discussed classified information on Signal about a military strike against Houthi rebels in Yemen.
(Image credit: Brendan Smialowski)
Severe storms are predicted to impact large areas of the United States through the weekend.
(Image credit: The National Weather Service)
Google has updated NotebookLM, its handy learning tool and AI podcast creator, so that it’s easier than ever to add sources. Now you can “search on the web” for sources of information that it turns into an AI podcast, mind map, or which it can answer questions about.
NotebookLM is designed to help you learn anything by breaking down large volumes of information into easily accessible reports and podcasts.
It doesn’t take a genius, however, to realize that its podcasts are so good they could easily replace real podcast hosts talking about literally any subject, and that’s where the new feature from Google leaves me in a bit of a moral quandary.
State your sourcesSince I run a tai chi podcast I decided to try out the new feature by asking NotebookLM to see what sources it would find on the subject of tai chi, and I was quite surprised at the articles it found.
There were some academic articles on tai chi in there, as I'd expect, along with articles from various tai chi websites, but also a Reddit discussion offering various perspectives on tai chi’s spirituality, and a YouTube video.
NotebookLM takes all these sources and produces various media for you, including an Audio Overview (it’s basically a podcast) that takes a deep dive into your subject.
It made me ponder whether all those article writers and Reddit commentators were happy that I was using their thoughts as fuel for an AI-generated podcast.
Credit where it's dueIt’s not like Google has added any new abilities to NotebookLM – you could always add any source you wanted – but at least you had to add it manually.
Making it actively scour the web to find a curated list of sources for you, without really asking the permission of any of these sources, then turning them into other types of media, does feel a little bit questionable.
If you are using NotebookLM purely as intended - i.e., to learn about a subject I don’t see a problem, but if those AI podcasts that are based on other people’s work, for example, get used in other ways, perhaps as income-generating podcasts, then that doesn’t always feel justified.
You might also likeMany businesses are still using weak passwords that can be cracked in less than a second in the event of a brute force attack to secure their accounts, new research from one of the best password managers, NordPass, has found.
Passwords such as ‘123456’, ‘secret’, and even ‘password’ are being used by thousands of businesses across the world, resulting in easy picking for hackers.
The research also found Germany was top in the world for password breaches, with 582,067 incidents, closely followed by the US with 502,435, and China at 448,375.
The password is ‘password’NordPass’ research used a 2.5 terabyte database compiled from numerous publicly available data sets, including some from the dark web that covered 11 industries.
For enterprise, the most common password in the database was ‘123456789’ with 378,182 uses, followed by the much easier to remember ‘123456’ with 356,341 uses, and just to round it all out ‘12345678’ comes in third with 145,688 uses.
Small and medium businesses don’t fare much better, with ‘123456’ topping the list for both with a total of 852,861 across both business sizes. Other classic passwords such as ‘qwerty123’, ‘abc123’, and ‘iloveyou’ also appear on the list, taking less than one second to crack.
Interestingly, the 28th most used password in NordPass’ dataset was ‘TimeLord12’, possibly suggesting that an IT worker with a love for Peter Capaldi’s work as the twelfth Doctor in Doctor Who was in charge of creating over 30,447 accounts that were later exposed.
NordPass also found many users who didn’t use the most common passwords would often use their own email address as their password, making it fairly easy for an attacker to crack their accounts. Names were also a common inclusion in the database, suggesting that employees were using their own names as a password.
(Image credit: Passwork)If you’ve seen your password somewhere in this article or in NordPass’ research, it might be time to change it to something more secure, lest you be responsible for a breach.
In order to better protect corporate accounts, businesses should put in place password creation rules that make it harder to use simple passwords that can be easily cracked. NordPass also offers a business password manager tier to help businesses generate and store passwords securely.
Businesses should also implement two-factor authentication when signing in to accounts to help verify that the person accessing the account is a legitimate user, and not a crook with stolen credentials. Businesses can also switch over to using passkeys, which use secure authentication to log in without the need to remember complex passwords.
You might also like