Businesses

Rackspace Customers Grapple With 'Devastating' Email Hosting Price Hike (arstechnica.com) 37

Rackspace's new pricing for its email hosting services is "devastating," according to a partner that has been using Rackspace as its email provider since 1999. From a report: In recent weeks, Rackspace updated its email hosting pricing. Its standard plan is now $10 per mailbox per month. Businesses can also pay for the Rackspace Email Plus add-on for an extra $2/mailbox/month (for "file storage, mobile sync, Office-compatible apps, and messaging"), and the Archiving add-on for an extra $6/mailbox/month (for unlimited storage).

As recently as November 2025, Rackspace charged $3/mailbox/month for its Standard plan, and an extra $1/mailbox/month for the Email Plus add-on, and an additional $3/mailbox/month for the Archival add-on, according to the Internet Archive's Wayback Machine. Rackspace's reseller partners have been especially vocal about the impacts of the new pricing.

In a blog post on Thursday, web hosting service provider and Rackspace reseller Laughing Squid said Rackspace is "increasing our email pricing by an astronomical 706 percent, with only a month-and-a half's notice." Laughing Squid founder Scott Beale told Ars Technica that he received the "devastating" news via email on Wednesday. The last time Rackspace increased Laughing Squid's email prices was by 55 percent in 2019, he said.

Technology

Dumbphone Owners Have Lost Their Minds (wired.com) 107

The growing enthusiasm among Gen Z for ditching smartphones in favor of basic "dumbphones" may be overlooking a significant cognitive reality, according to a WIRED essay that draws on the 1998 "extended mind hypothesis" by philosophers Andy Clark and David Chalmers. The hypothesis argues that external tools can extend the biological brain in an all but physical way, meaning your phone isn't just a device -- it's part of a single cognitive system composed of both the tool and your brain.

"Interference with my phone is like giving me some brain damage," Clark told Wired. He expressed concern about the dumbphone movement, calling it "generally a retrograde step" and warning that as smartphone enmeshment becomes the societal norm, those who opt out risk becoming "effectively disabled within that society." Clark described this as "the creation of a disempowered class."

98% of Americans between 18 and 29 own a smartphone, dropping only to 97% for those aged 30 to 49. Even committed dumbphone users struggle. One user profiled in the piece still carries an "emergency iPhone" for work requirements and admits long-distance friendships have become "nearly impossible to maintain."
Education

Young US College Graduates Suddenly Aren't Finding Jobs Faster Than Non-College Graduates (msn.com) 84

U.S. college graduates "have historically found jobs more quickly than people with only a high school degree," writes Bloomberg.

"But that advantage is becoming a thing of the past, according to new research from the Federal Reserve Bank of Cleveland." "Recently, the job-finding rate for young college-educated workers has declined to be roughly in line with the rate for young high-school-educated workers, indicating that a long period of relatively easier job-finding prospects for college grads has ended," Cleveland Fed researchers Alexander Cline and BarıÅY Kaymak said in a blog post published Monday. The study follows the latest monthly employment data released on Nov. 20, which showed the unemployment rate for college-educated workers continued to rise in September amid an ongoing slowdown in white-collar hiring... The unemployment rate for people between the ages of 20 to 24 was 9.2% in September, up 2.2 percentage points from a year prior.
There is a caveat. "Young college graduates maintain advantages in job stability and compensation once hired..." the researchers write. "The convergence we document concerns the initial step of securing employment rather than overall labor market outcomes."

Their research includes a graph showing how the "unemployment gap" first increased dramatically after 2010 between college-educated and high school-educated workers, which the researchers attribute to "the prolonged jobless recovery after 2008". But that gap has been closing ever since, with that gap now smaller than at any time since the 1970s.

"Young high school workers are riding the wave of the historically tight postpandemic labor market with well-below-average unemployment compared to that of past high school graduates, while young college workers are experiencing unemployment rates rarely observed among past college cohorts barring during recessions." The labor market advantages conferred by a college degree have historically justified individual investment in higher education and expanding support for college access. If the job-finding rate of college graduates continues to decline relative to the rate for high school graduates, we may see a reversal of these trends. The convergence we document concerns the initial step of securing employment rather than overall labor market outcomes. These details suggest a nuanced shift in employment dynamics, one in which college graduates face greater difficulty finding jobs than previously but maintain advantages compared with high school graduates in job stability and compensation once hired.
Two key quotes:
  • "Declining job prospects among young college graduates may reflect the continued growth in college attainment, adding ever larger cohorts of college graduates to the ranks of job seekers, even though technology no longer favors college-educated workers."
  • "Developments related to AI, which may be affecting job-finding prospects in some cases, cannot explain the decades-long decline in the college job-finding rate."

Windows

Microsoft Forced to Issue Emergency Out-of-Band Windows Update (windowscentral.com) 74

The senior editor at the blog Windows Central decries two serious Windows issues "that were not spotted by Microsoft during testing, and are so severe that the company has now issued an emergency fix to address the problems." Microsoft's first update for Windows 11 in 2026 has already caused two major issues that saw users unable to fully shutdown their PCs or sign-in into a device when using Remote Desktop... Being unable to shut down your PC due to a recent OS update is a huge oversight on Microsoft's part, but this is the latest in a long list of updates over the last year to cause a major issue like this... Other issues that have cropped up in Windows 11 in the last year include a bug that caused Task Manager to fail to close when the user exited the application, causing system resources to lock up after a prolonged period of time if the user had opened and closed Task Manager multiple times in a session. Another update caused saw File Explorer flashbang users with a white screen when opening it in dark mode, which appeared in an update that was supposed to improve dark mode on Windows 11...

For whatever reason, the Windows Insider Program doesn't appear to be working anymore, as severe bugs are somehow making it into shipping versions of the OS.

"The out of band updates, KB5077744 and KB5077797, are available now via Windows Update and is rolling out to everybody," they write. "Once installed, your PC should go back to being able to shut down successfully, and signing-in via Remote Desktop should work again."

Microsoft has also officially acknowledged a third bug which crashes Outlook Classic when using POP accounts, according to the blog Windows Latest, which adds that that bug has not yet been fixed.

They've also identified other minor bugs, including "a black screen problem in Windows 11 KB5074109... either due to the update itself or some compatibility issues with GPU drivers." After you install the January 2026 Update, Windows triggers random black screens where the desktop freezes for a second or two, the display goes black, then everything comes back. I can't pinpoint any specific configuration, but I can confirm the black screen issue has been observed on a small subset of PCs with both Nvidia and AMD GPUs. After you install the January 2026 Update, Windows triggers random black screens where the desktop freezes for a second or two, the display goes black, then everything comes back.
Security

Predator Spyware Turns Failed Attacks Into Intelligence For Future Exploits (securityweek.com) 5

In December 2024 the Google Threat Intelligence Group published research on the code of the commercial spyware "Predator". But there's now been new research by Jamf (the company behind a mobile device management solution) showing Predator is more dangerous and sophisticated than we realized, according to SecurityWeek.

Long-time Slashdot reader wiredmikey writes: The new research reveals an error taxonomy that reports exactly why deployments fail, turning black boxes into diagnostic events for threat actors. Almost exclusively marketed to and used by national governments and intelligence agencies, the spyware also detects cybersecurity tools, suppresses forensics evidence, and has built-in geographic restrictions.
Security

To Pressure Security Professionals, Mandiant Releases Database That Cracks Weak NTLM Passwords in 12 Hours (arstechnica.com) 34

Ars Technica reports: Security firm Mandiant [part of Google Cloud] has released a database that allows any administrative password protected by Microsoft's NTLM.v1 hash algorithm to be hacked in an attempt to nudge users who continue using the deprecated function despite known weaknesses.... a precomputed table of hash values linked to their corresponding plaintext. These generic tables, which work against multiple hashing schemes, allow hackers to take over accounts by quickly mapping a stolen hash to its password counterpart... Mandiant said it had released an NTLMv1 rainbow table that will allow defenders and researchers (and, of course, malicious hackers, too) to recover passwords in under 12 hours using consumer hardware costing less than $600 USD. The table is hosted in Google Cloud. The database works against Net-NTLMv1 passwords, which are used in network authentication for accessing resources such as SMB network sharing.

Despite its long- and well-known susceptibility to easy cracking, NTLMv1 remains in use in some of the world's more sensitive networks. One reason for the lack of action is that utilities and organizations in industries, including health care and industrial control, often rely on legacy apps that are incompatible with more recently released hashing algorithms. Another reason is that organizations relying on mission-critical systems can't afford the downtime required to migrate. Of course, inertia and penny-pinching are also causes.

"By releasing these tables, Mandiant aims to lower the barrier for security professionals to demonstrate the insecurity of Net-NTLMv1," Mandiant said. "While tools to exploit this protocol have existed for years, they often required uploading sensitive data to third-party services or expensive hardware to brute-force keys."

"Organizations that rely on Windows networking aren't the only laggards," the article points out. "Microsoft only announced plans to deprecate NTLMv1 last August."

Thanks to Slashdot reader joshuark for sharing the news.
Social Networks

Supreme Court Hacker Posted Stolen Government Data On Instagram (techcrunch.com) 12

An anonymous reader quotes a report from TechCrunch: Last week, Nicholas Moore, 24, a resident of Springfield, Tennessee, pleaded guilty to repeatedly hacking into the U.S. Supreme Court's electronic document filing system. At the time, there were no details about the specifics of the hacking crimes Moore was admitting to. On Friday, a newly filled document -- first spotted by Court Watch's Seamus Hughes -- revealed more details about Moore's hacks. Per the filing, Moore hacked not only into the Supreme Court systems, but also the network of AmeriCorps, a government agency that runs stipend volunteer programs, and the systems of the Department of Veterans Affairs, which provides healthcare and welfare to military veterans.

Moore accessed those systems using stolen credentials of users who were authorized to access them. Once he gained access to those victims' accounts, Moore accessed and stole their personal data and posted some online to his Instagram account: @ihackthegovernment. In the case of the Supreme Court victim, identified as GS, Moore posted their name and "current and past electronic filing records." [...] According to the court document, Moore faces a maximum sentence of one year in prison and a maximum fine of $100,000.

Businesses

AI Has Made Salesforce Engineers More Productive, So the Company Has Stopped Hiring Them, CEO Says (itpro.com) 47

Salesforce CEO Marc Benioff said this week that his company's software engineering headcount has remained "mostly flat" over the past year as internal AI tools have delivered substantial productivity gains.

Speaking on TBPN, Benioff said he has about 15,000 engineers who are "more productive than ever." The company has redirected its hiring efforts toward sales and customer engagement roles, hiring 20% more account executives this year as it pushes its Agentforce agentic AI service.

Human salespeople remain essential for explaining the "intricacies and nuances" of agentic AI to skeptical enterprise customers, he argued. Other parts of the business have seen deeper cuts. In a separate appearance on The Logan Bartlett Show, Benioff said that Salesforce had reduced its customer support workforce by roughly 50%.
IT

Raspberry Pi's New Add-on Board Has 8GB of RAM For Running Gen AI Models (theverge.com) 49

An anonymous reader shares a report: Raspberry Pi is launching a new add-on board capable of running generative AI models locally on the Raspberry Pi 5. Announced on Thursday, the $130 AI HAT+ 2 is an upgraded -- and more expensive -- version of the module launched last year, now offering 8GB of RAM and a Hailo 10H chip with 40 TOPS of AI performance.

Once connected, the Raspberry Pi 5 will use the AI HAT+ 2 to handle AI-related workloads while leaving the main board's Arm CPU available to complete other tasks. Unlike the previous AI HAT+, which is focused on image-based AI processing, the AI HAT+ 2 comes with onboard RAM and can run small gen AI models like Llama 3.2 and DeepSeek-R1-Distill, along with a series of Qwen models. You can train and fine-tune AI models using the device as well.

IT

House Sysadmin Stole 200 Phones, Caught By House IT Desk (arstechnica.com) 32

An anonymous reader quotes a report from Ars Technica: According to the government's version of events, 43-year-old Christopher Southerland was working in 2023 as a sysadmin for the House Committee on Transportation and Infrastructure. In his role, Southerland had the authority to order cell phones for committee staffers, of which there are around 80. But during the early months of 2023, Southerland is said to have ordered 240 brand-new phones -- far more than even the total number of staffers -- and to have shipped them all to his home address in Maryland.

The government claims that Southerland then sold over 200 of these cell phones to a local pawn shop, which was told to resell the devices only "in parts" as a way to get around the House's mobile device management software, which could control the devices remotely. It's hard to find good help these days, though, even at pawn shops. At some point, at least one of the phones ended up, intact, on eBay, where it was sold to a member of the public.

This member of the public promptly booted the phone, which did not display the expected device operating system screen but instead "a phone number for the House of Representatives Technology Service Desk." The phone buyer called this number, which alerted House IT staff that government phones were being sold on eBay. According to the government, this sparked a broader investigation to figure out what was going on, which revealed that "several phones purchased by Southerland were unaccounted for." The full scheme is said to have cost the government over $150,000.
Southerland was indicted in early December 2025 and arrested on January 8, 2026. He pled not guilty and has a court date scheduled for later this month.
IT

Dell Tells Staff To Get Ready For the 'Biggest Transformation in Company History' (businessinsider.com) 75

Dell's chief operating officer Jeff Clarke has informed employees that the company is preparing for what he calls the "biggest transformation in company history," a sweeping systems overhaul scheduled to launch on May 3 that will standardize processes across nearly every major division.

The initiative, dubbed One Dell Way, will replace Dell's existing sprawl of applications, servers and databases with a single enterprise platform designed to unify the 42-year-old company's operations. Clarke's memo, sent to staff on Tuesday and obtained by Business Insider, said Dell has spent the past two years building toward this transition.

The May 3 launch will affect the company's PC business, finance, supply chain, marketing, sales, revenue operations, services, and HR. The ISG division, which handles cloud and AI infrastructure, will follow in August. "We need one way -- simplified, standardized and automated -- so we can be more competitive and serve our customers better," Clarke wrote. Mandatory training begins February 3.
China

Beijing Tells Chinese Firms To Stop Using US and Israeli Cybersecurity Software (yahoo.com) 26

An anonymous reader shares a report: Chinese authorities have told domestic companies to stop using cybersecurity software made by roughly a dozen firms from the U.S. and Israel due to national security concerns, two people briefed on the matter said.

As trade and diplomatic tensions flare between China and the U.S. and both sides vie for tech supremacy, Beijing has been keen to replace Western-made technology with domestic alternatives. The U.S. companies whose cybersecurity software has been banned include Broadcom-owned VMware, Palo Alto Networks and Fortinet, while the Israeli companies include Check Point Software Technologies, the sources said.

Cloud

Bezos's Vision of Rented Cloud PCs Looks Less Far-Fetched (windowscentral.com) 153

Amazon founder Jeff Bezos once told an audience that he views local PC hardware the same way he views a 100-year-old electric generator he saw in a brewery museum -- as a relic of a pre-grid era, destined to be replaced by centralized utilities that users simply rent rather than own. The anecdote, shared at a talk a few years ago, positioned Amazon Web Services and Microsoft Azure as the inevitable successors to the desktop tower. Bezos argued that users would eventually abandon local computing for cloud-based solutions, much as businesses once abandoned on-site power generation for the electrical grid.

Current market dynamics have made that prediction feel more plausible. DRAM prices have become increasingly untenable for consumers, and companies like Dell and ASUS have signaled price increases across their PC ranges. Micron has shut down its consumer DRAM operations entirely, prioritizing AI datacenter demand instead. SSD storage is expected to face similar constraints. Cloud gaming services from Amazon Luna, NVIDIA GeForce Now and Xbox are seeing steady growth.

Microsoft previously developed a consumer version of its business-grade Windows 365 cloud PC product, though the company deprioritized it -- the economics didn't work when cheap laptops remained available. That calculus could shift. Xbox Game Pass's 1440p cloud gaming runs $30 monthly and NVIDIA recently imposed a 100-hour cap on its cloud platform. The infrastructure remains expensive to operate, but rising local hardware costs may eventually close that gap.
Microsoft

UK Police Blame Microsoft Copilot for Intelligence Mistake (theverge.com) 60

The chief constable of one of Britain's largest police forces has admitted that Microsoft's Copilot AI assistant made a mistake in a football (soccer) intelligence report. From a report: The report, which led to Israeli football fans being banned from a match last year, included a nonexistent match between West Ham and Maccabi Tel Aviv.

Copilot hallucinated the game and West Midlands Police included the error in its intelligence report without fact checking it. "On Friday afternoon I became aware that the erroneous result concerning the West Ham v Maccabi Tel Aviv match arose as result of a use of Microsoft Co Pilot [sic]," says Craig Guildford, chief constable of West Midlands Police, in a letter to the Home Affairs Committee earlier this week. Guildford previously denied in December that the West Midlands Police had used AI to prepare the report, blaming "social media scraping" for the error.

Security

Never-Before-Seen Linux Malware Is 'Far More Advanced Than Typical' (arstechnica.com) 27

An anonymous reader quotes a report from Ars Technica: Researchers have discovered a never-before-seen framework that infects Linux machines with a wide assortment of modules that are notable for the range of advanced capabilities they provide to attackers. The framework, referred to as VoidLink by its source code, features more than 30 modules that can be used to customize capabilities to meet attackers' needs for each infected machine. These modules can provide additional stealth and specific tools for reconnaissance, privilege escalation, and lateral movement inside a compromised network. The components can be easily added or removed as objectives change over the course of a campaign.

VoidLink can target machines within popular cloud services by detecting if an infected machine is hosted inside AWS, GCP, Azure, Alibaba, and Tencent, and there are indications that developers plan to add detections for Huawei, DigitalOcean, and Vultr in future releases. To detect which cloud service hosts the machine, VoidLink examines metadata using the respective vendor's API. Similar frameworks targeting Windows servers have flourished for years. They are less common on Linux machines. The feature set is unusually broad and is "far more advanced than typical Linux malware," said researchers from Checkpoint, the security firm that discovered VoidLink. Its creation may indicate that the attacker's focus is increasingly expanding to include Linux systems, cloud infrastructure, and application deployment environments, as organizations increasingly move workloads to these environments.
"VoidLink is a comprehensive ecosystem designed to maintain long-term, stealthy access to compromised Linux systems, particularly those running on public cloud platforms and in containerized environments," the researchers said in a separate post. "Its design reflects a level of planning and investment typically associated with professional threat actors rather than opportunistic attackers, raising the stakes for defenders who may never realize their infrastructure has been quietly taken over."

The researchers note that VoidLink poses no immediate threat or required action since it's not actively targeting systems. However, defenders should remain vigilant.

Slashdot Top Deals