#cybersecurity

[ follow ]
Information security
fromDataBreaches.Net
3 days ago

Industry Continues to Push Back on HIPAA Security Rule Overhaul - DataBreaches.Net

Healthcare organizations oppose HHS’s proposed HIPAA Security Rule updates due to new financial burdens and unrealistic implementation deadlines.
#ai-safety
#journalism-funding
Medicine
fromFast Company
1 day ago

The 'internet of beings' is the next fronteir that could change humanity and healthcare

Implanted microscopic sensors will connect human organs to the internet, enabling continuous health monitoring, active biological intervention, and major medical, ethical, and security consequences.
#mergers--acquisitions
#generative-ai
Information security
fromTheregister
1 day ago

Remedio CEO: If you don't think like a hacker, you won't win

AI that mimics hacker thinking enables proactive defense of corporate networks by anticipating attacker methods and automating offensive-style security testing.
fromTechCrunch
1 day ago

These are the cybersecurity stories we were jealous of in 2025 | TechCrunch

It's the end of the year. That means it's time for us to celebrate the best cybersecurity stories we didn't publish. Since 2023, TechCrunch has looked back at the best stories across the board from the year in cybersecurity. If you're not familiar, the idea is simple. There are now dozens of journalists who cover cybersecurity in the English language. There are a lot of stories about cybersecurity, privacy, and surveillance that are published every week.
Information security
fromtechcrunch.com
2 days ago

How a Spanish virus brought Google to Malaga | TechCrunch

After 33 years, Bernardo Quintero decided it was time to find the person who changed his life the anonymous programmer who created a computer virus that had infected his university decades earlier. The virus, called Virus Malaga, was mostly harmless. But the challenge of defeating it sparked Quintero's passion for cybersecurity, eventually leading him to found VirusTotal, a startup that Google acquired in 2012. That acquisition brought Google's flagship European cybersecurity center to Malaga, transforming the Spanish city into a tech hub.
Information security
Information security
fromThe Hacker News
2 days ago

ThreatsDay Bulletin: Stealth Loaders, AI Chatbot Flaws AI Exploits, Docker Hack, and 15 More Stories

Malicious actors increasingly hide within everyday technologies and trusted interfaces, making detection reliant on heightened awareness rather than larger perimeter defenses.
Careers
fromAol
3 days ago

15 Work-From-Home Jobs That Pay at Least $35 an Hour

Several high-paying, fully remote careers exist, including software development, cybersecurity, marketing, project management, and accounting, often requiring bachelor's degrees or certifications.
from24/7 Wall St.
3 days ago

CrowdStrike (NASDAQ: CRWD) Stock Price Prediction and Forecast 2025-2030 (Jan 2025)

Investors are concerned with future stock performance over the next one, five, or 10 years. While most Wall Street analysts will calculate 12-month forward projections, it is clear that nobody has a consistent crystal ball, and plenty of unforeseen circumstances can render even near-term projections irrelevant. 24/7 Wall St. aims to present some further-looking insights based on CrowdStrike's own numbers, along with business and market development information that may be of help with your own research.
Information security
Artificial intelligence
fromBusiness Insider
4 days ago

Blackstone's CTO explains how he uses his 35-minute subway ride to stay sharp and upskill

John Stecher prioritizes continuous upskilling, using daily subway reading of cross-industry tech research and weekend experimentation to keep Blackstone competitive.
#servicenow
fromFortune
3 weeks ago
Information security

ServiceNow's Amit Zavery explains why the company is buying identity management platform Veza | Fortune

fromFortune
3 weeks ago
Information security

ServiceNow's Amit Zavery explains why the company is buying identity management platform Veza | Fortune

Information security
fromenglish.elpais.com
4 days ago

The story of the Malaga virus: The code that haunted Google's cybersecurity center director for 30 years

Bernardo Quintero traced his cybersecurity career to solving a mysterious early-1990s Malaga computer virus, later founding Hispasec and VirusTotal.
Information security
fromTechCrunch
4 days ago

France's postal and banking services disrupted by suspected DDoS attack | TechCrunch

La Poste's online and banking systems were knocked offline by a suspected DDoS attack causing major network disruption and unavailability of web and mobile services.
Privacy professionals
fromData Matters Privacy Blog
5 days ago

The 12th Edition of Lexology In-Depth: Privacy, Data Protection and Cybersecurity is now available | Data Matters Privacy Blog

Comprehensive global overview of legal and regulatory regimes governing data privacy, covering processors' obligations, data subject rights, transfers, cyber-risk mitigation, enforcement, and future developments.
Artificial intelligence
fromwww.housingwire.com
5 days ago

Financial firms face rising cyber risks, data challenges

Rapidly accelerating risks, including AI-enabled fraud and cybersecurity threats, outpace many financial firms' capabilities, amplified by poor data quality and manual processes.
Startup companies
fromAlleywatch
5 days ago

The Weekly Notable Startup Funding Report: 12/22/25

US startups raised $6.4B across 27 notable funding rounds, including major investments for Chai Discovery, Adaptive Security, and Aeovian Pharmaceuticals.
#ai-security
fromFuturism
6 days ago

White House Confused by How Random YouTuber's Stream Became Featured on Its Website

The livestream was hosted by @RealMattMoney, who can be seen in a Bloomberg screenshot - see below - on the White House's "Live News" section sitting at a typical streaming setup, and wearing gaming headphones and a dark gray t-shirt. An overlay shows his stream chat, where viewers praise his analysis. Beneath the video window, the stream's title, displayed in elegant White House font, promises there will be "no mid-stream ads," plus a little descriptor offering a $10 discount if you click a link for "StreamYard."
US politics
fromFuturism
6 days ago

Police Warn of Robot Crime Wave

But what would happen if such a technology were to land in the hands of terrorists and criminals, who aren't beholden to the norms of modern warfare at all? In a new report, pan-European police agency Europol's Innovation Lab has imagined a not-so-distant future in which criminals could hijack autonomous vehicles, drones, and humanoid robots to sow chaos - and how law enforcement will have to step up as a result.
Information security
Privacy technologies
fromKotaku
1 week ago

NordProtect Online Identity Service Covers Up to $10K in Scam Losses, Now Going for Peanuts - Kotaku

Record-low identity protection at $4.49/month can reduce heightened holiday identity theft risk amid increased online transactions and widespread fraud.
#data-breach
fromTechCrunch
2 weeks ago
Information security

Exclusive: Petco takes down Vetco website after exposing customers' personal information

fromTechCrunch
2 weeks ago
Information security

Exclusive: Petco takes down Vetco website after exposing customers' personal information

fromwww.eastbaytimes.com
1 week ago

YouTuber's livestream mysteriously takes over White House website

The livestream of a YouTube content creator talking about investments mysteriously appeared to take over a White House website, raising questions about whether the site was hacked. The livestream appeared for at least eight minutes late Thursday on whitehouse.gov/live, where the White House usually streams live video of the president speaking. It's unclear if the website was breached or the video was linked accidentally by someone in the government. The White House said in a statement that it was aware and looking into what happened.
US politics
UK news
fromComputerWeekly.com
1 week ago

UK government confirms Foreign Office cyber attack | Computer Weekly

FCDO IT systems were hacked in October, with the government calling individual data risk low while attribution remains unclear and Cisco vulnerabilities (Storm 1849/ArcaneDoor) implicated.
fromTechzine Global
1 week ago

OpenAI introduces GPT-5.2-Codex for software engineering

OpenAI has released GPT-5.2-Codex, a new version of its agentic AI model for software development that focuses specifically on professional software engineering and cybersecurity. The model builds on GPT-5.2 but has been further optimized to work independently within complex development environments. With this release, OpenAI is positioning Codex not just as a programming assistant but as a broader support technology for the entire software development process.
Software development
UK politics
fromwww.theguardian.com
1 week ago

Not clear' who was behind FCDO hack, says minister, amid reports of China link UK politics live

Reform UK retained a Cornwall council seat in a byelection while the FCDO reported a cyber hack in October with uncertain attribution.
UK news
fromwww.theguardian.com
1 week ago

UK Foreign Office victim of cyber-attack in October, says Chris Bryant

The UK's Foreign, Commonwealth and Development Office suffered a cyber breach in October, with officials saying individual risk is low and attribution remains unclear.
fromTheregister
1 week ago

China turns on a vast and very rapid experimental network

As reported in Chinese state media, tests of the network saw it shift 72 terabytes of data in 1.6 hours, across a distance of around 1,000 km between a radio telescope in Guizhou province and a university in Hubei. We think that's almost 100 Gbit/s, an impressive feat for a sustained long-distance data transfer even if it took place in a controlled environment.
Information security
Miscellaneous
fromwww.theguardian.com
1 week ago

Denmark says Russia was behind two destructive and disruptive' cyber-attacks

Russia used pro-Russian hacker groups to carry out cyber-attacks on Danish infrastructure and websites, signaling hybrid warfare targeting Denmark and Western support for Ukraine.
Information security
fromWIRED
1 week ago

ICE Seeks Cyber Upgrade to Better Surveil and Investigate Its Employees

ICE is renewing a cybersecurity contract to expand monitoring, collection, and sharing of employee digital activity for security and internal investigations.
fromComputerworld
1 week ago

WhatsApp accounts targeted in 'GhostPairing' attack

A warning for WhatsApp users: cybercriminals have discovered an alarmingly simple way to access a user's conversations in real time by manipulating the app's device pairing or linking routine.
Information security
Information security
fromwww.aljazeera.com
1 week ago

New Somalia e-visa security flaw puts personal data of thousands at risk

Somalia's e-visa website is insecure, allowing mass downloads of e-visas that expose passport numbers, full names, and dates of birth.
fromwww.independent.co.uk
1 week ago

France investigating foreign interference' after tracking software found on ferry

Whether it's investigating the financials of Elon Musk's pro-Trump PAC or producing our latest documentary, 'The A Word', which shines a light on the American women fighting for reproductive rights, we know how important it is to parse out the facts from the messaging. At such a critical moment in US history, we need reporters on the ground. Your donation allows us to keep sending journalists to speak to both sides of the story.
France news
Venture
fromAlleywatch
1 week ago

The AlleyWatch Startup Daily Funding Report: 12/17/2025

Cyera raised $400M, DataLane raised $22.5M Series A, and Dux Security raised $9M Seed amid NYC startup funding activity.
fromFortune
1 week ago

How Amazon's CSO defends against efforts by North Korean IT workers to infiltrate his company | Fortune

Steve Schmidt, the chief security officer at Amazon, says his team has identified and blocked more than 1,800 attempts by North Korea to secure IT roles at the tech giant. He warns that this scheme is becoming more prevalent across the technology industry as the nation-state actor targets the lucrative salaries of generative artificial intelligence and machine learning jobs, and the troves of valuable data such workers have access to.
Information security
France news
fromThe Local France
1 week ago

France probes 'foreign interference' after malware found on ferry

French authorities are investigating suspected foreign interference after malware enabling remote control was found on a passenger ferry and a Latvian crew member was arrested.
fromLondon Business News | Londonlovesbusiness.com
1 week ago

Top IT challenges businesses face (and how 24/7 support helps) - London Business News | Londonlovesbusiness.com

Technology plays an important role in how businesses operate, communicate, and deliver services. As systems become more advanced, many companies find themselves facing IT challenges that disrupt daily work, affect productivity, and impact customer experience. Believe it or not, these issues aren't limited to large organisations, as small and medium-sized businesses often feel the pressure even more, especially when IT responsibilities fall on already busy teams.
Information security
Information security
fromWIRED
1 week ago

Microsoft Will Finally Kill an Encryption Cipher That Enabled a Decade of Windows Hacks

Microsoft will disable default RC4 support in Windows domain controllers to remove an obsolete, vulnerable cipher long exploited by attackers.
Artificial intelligence
fromAbove the Law
1 week ago

AI Summit 2025: 10 Takeaways And Some Unanswered Questions - Above the Law

The AI Summit prioritized vendor promotion and hype over critical discussions of infrastructure, energy, verification, and economic challenges.
Venture
fromAlleywatch
1 week ago

The AlleyWatch Startup Daily Funding Report: 12/16/2025

Adaptive Security raised $81M Series B; Nanit raised $50M; Echo raised $35M Series A; funding updates for NYC startups on 12/16/2025.
Information security
fromNextgov.com
1 week ago

Quantum cryptography implementation timelines must be shortened, industry CEO to tell Congress

Combining AI and quantum computing threatens current encryption, creating new cyber fault lines that demand comprehensive, network-wide quantum-resistant protections.
fromTheregister
1 week ago

SoundCloud bounces some VPNs as it cleans up cyberattack

"SoundCloud recently detected unauthorized activity in an ancillary service dashboard," opens a Monday post from the company. "Upon making this discovery, we immediately activated our incident response protocols and promptly contained the activity. We also engaged leading third-party cybersecurity experts to assist in a thorough investigation and response." Not long after SoundCloud and its hired help contained the incident, the site became the subject of multiple denial of service attacks.
Information security
World news
fromFast Company
1 week ago

National security experts warn extremist groups are experimenting with AI. Here's how

Extremist groups are using accessible AI to produce propaganda, realistic deepfakes, and refine cyberattacks to recruit and amplify their influence.
UK news
fromIT Pro
1 week ago

Cyber resilience in the UK: learning to take the punches

The Cyber Security and Resilience Bill will strengthen UK cyber defences, give regulators new powers, and require certain organisations to increase cybersecurity and resilience.
Information security
fromComputerWeekly.com
1 week ago

In cyber security, basics matter, even in 2025 | Computer Weekly

Effective cyber security requires implementing basic controls and authoritative asset management before relying on advanced AI-driven innovations.
#nyc-startups
DevOps
fromIT Pro
1 week ago

Autonomous IT: Driving Efficiency and Security with Tanium

Autonomous patch management automates vulnerable-system patching, saving time and money, improving security, and freeing IT teams for higher-value tasks.
fromFortune
1 week ago

Making nightmares into reality: AI finds fans in the Islamic State, other militant and terrorist other groups worldwide | Fortune

As the rest of the world rushes to harness the power of artificial intelligence, militant groups also are experimenting with the technology, even if they aren't sure exactly what to do with it. For extremist organizations, AI could be a powerful tool for recruiting new members, churning out realistic deepfake images and refining their cyberattacks, national security experts and spy agencies have warned.
World news
fromwww.bbc.com
1 week ago

Russia poses acute threat, new MI6 chief to warn

The new chief of MI6, Blaise Metreweli, will warn of "the acute threat posed by Russia" when she makes her first public speech later. She will highlight so-called hybrid warfare, which includes incidents such as cyber attacks and drones suspected of being launched near critical infrastructure by Russian proxies. Ms Metreweli will describe this as "an acute threat posed by an aggressive, expansionist and revisionist Russia".
UK politics
fromOregon ArtsWatch * Arts & Culture News
2 weeks ago

Deschutes Public Library closes in wake of cyberattack, in abundance of caution * Oregon ArtsWatch

When the library system's IT department detected suspicious activity on one of the library's servers Thursday morning, staff immediately "turned off the server in the middle of this happening," as well as shut down all remote access to the library's computer systems, library director Todd Dunkelberg said. "That stopped all activity," Dunkelberg said Friday about the cyberattack, which was first reported by KTVZ, as well as Oregon Public Broadcasting.
Information security
fromwww.mediaite.com
2 weeks ago

Shocking': Fox's Jennifer Griffin Reacts to Three Top Cybersecurity Jobs Left Open by Trump

Bacon wrote, This means the top two positions at NSA and the four-star commander at Cyber Command will remain vacant for 8 months and counting. We are at Cyber War every day, and the inability to get leaders in place is gross negligence. Bacon went on to blame the chaos on infighting in the White House and the involvement of whacky Laura Loomer in hiring.
US politics
Information security
fromComputerWeekly.com
2 weeks ago

Streisand effect: Businesses that pay ransomware gangs are more likely to hit the headlines | Computer Weekly

Paying ransomware demands increases the likelihood of negative publicity compared with refusing to pay.
UK politics
fromBusiness Matters
2 weeks ago

Scandal-hit OBR faced nearly 240,000 cyber attacks this year amid website failure that leaked Budget

The OBR experienced a 162% surge to 238,678 cyber attacks, exposed by a WordPress misconfiguration that leaked the Chancellor's Budget, revealing public-sector vulnerabilities.
fromwww.itpro.com
2 weeks ago

LastPass hit with ICO fine after 2022 data breach exposed 1.6 million users here's how the incident unfolded

LastPass failed customers and fell short on expectations that the company would employ robust measures to protect personal data. Password managers are a safe and effective tool for businesses and the public to manage their numerous login details and we continue to encourage their use, he said. However, as is clear from this incident, businesses offering these services should ensure that system access and use is restricted to ensure risks of attack are significantly reduced,
Information security
fromNextgov.com
2 weeks ago

Cyber takes back seat to immigration in global threats hearing

Despite overwhelming focus on the Department of Homeland Security's handling of immigration enforcement, a Thursday hearing on worldwide threats targeting the U.S. did feature some insights into the biggest cybersecurity challenges facing the nation. DHS Secretary Kristi Noem, National Counterterrorism Center Director Joe Kent and FBI National Security Branch operations chief Michael Glasheen testified before the House Homeland Security Committee in the annual hearing meant to discuss terrorism, cybersecurity, drones and other matters that concern Americans' security.
US politics
UK politics
fromwww.independent.co.uk
2 weeks ago

MPs warned over Russian attempts to target them via WhatsApp

British MPs have been warned about foreign attempts linked to Russia to target them via phishing and messaging apps, prompting government and NCSC countermeasures.
New York City
fromAlleywatch
2 weeks ago

The AlleyWatch Startup Daily Funding Report: 12/10/2025

Several NYC startups raised funding: Radial $50M, Parametrix $27M, Crisp $26M, SuperCircle $24M, and Prime Security $20M.
fromTechCrunch
2 weeks ago

CEO of South Korean retail giant Coupang resigns after massive data breach | TechCrunch

The retail giant, often compared to Amazon for its dominance in South Korean e-commerce and logistics, last month revealed details of a data breach affecting close to 34 million people. The breach allegedly began in June but wasn't noticed until November, when Coupang initially said over 4,500 customers had their data stolen. The company later revised that figure dramatically upward.
Information security
Information security
fromTheregister
2 weeks ago

US extradites Ukrainian accused of hacking for Russia

Ukrainian woman extradited to the U.S. accused of hacking U.S. water systems and a meat processing facility for Kremlin-backed cyber groups; trials set for 2026.
Information security
fromZDNET
2 weeks ago

Gartner urges businesses to 'block all AI browsers' - what's behind the dire warning

CISOs should block agentic AI browsers until security vulnerabilities are reduced because they pose significant risks from incorrect outputs and potential attacks.
Information security
fromIT Pro
2 weeks ago

Cyber budget cuts are slowing down, but that doesn't mean there's light on the horizon for security teams

Cybersecurity teams face a critical shift from headcount shortages to severe skills shortages, increasing breach risk despite slowing budget cuts and layoffs.
Information security
fromwww.housingwire.com
2 weeks ago

From resilience to antifragility: Rethinking cybersecurity for real estate and mortgage professionals

Cybersecurity must move beyond resilience to antifragility, using stress and incidents to strengthen systems, learn, and improve defenses.
Information security
fromComputerWeekly.com
2 weeks ago

Ethical hackers can be heroes: It's time for the law to catch up | Computer Weekly

Statutory legal protections for security researchers are needed to allow safe vulnerability disclosure and strengthen organisational cyber defences without risking prosecution.
Information security
fromComputerWeekly.com
2 weeks ago

NCSC warns of confusion over true nature of AI prompt injection | Computer Weekly

Prompt injection attacks against LLMs differ from SQL injection and may be harder to mitigate, increasing risks of data leaks, disinformation, and malicious guidance.
fromThe Atlantic
2 weeks ago

The Mystery of Mohammad Tajik

In December 2011, the CIA lost control of a stealth drone near the Iranian city of Kashmar, about 140 miles from the Afghanistan border, and it wound up in the regime's possession. On state television, the Iranian military displayed the boomerang-shaped craft like a trophy. Triumphant banners beneath its 30-foot wings said, in Farsi, THE US CAN'T MESS WITH US and WE'LL CRUSH AMERICA UNDERFOOT.
Information security
Information security
fromIT Pro
2 weeks ago

AWS CISO Amy Herzog thinks AI agents will be a 'boon' for cyber professionals - and teams at Amazon are already seeing huge gains

Amazon's cybersecurity teams use AI agents to automate CVE analysis and related tasks, reducing manual toil and enabling deeper human-focused security work.
US politics
fromNextgov.com
3 weeks ago

Trump's national security strategy wants spy agencies to watch world supply chains

U.S. intelligence agencies will monitor global supply chains to decouple the U.S. economy from foreign adversaries and protect American economic and national security.
fromForbes
3 weeks ago

Cloudflare Says It Has Fixed Outage That Impacted Zoom And LinkedIn

Cloudflare says it has fixed an outage that took down several websites and apps, including Zoom, LinkedIn, Shopify and Fortnite, early on Friday, in the latest major glitch involving the web traffic management giant whose shares dipped in premarket trading. Another Cloudflare outage took down several websites and apps early on Friday morning. An update on Cloudflare's status page said the nearly half-hour-long outage was the result of "issues with Cloudflare Dashboard and related APIs."
Tech industry
fromAxios
3 weeks ago

Exclusive: Some AI dangers are already real, DeepMind's Hassabis says

The big picture: Hassabis in May had predicted AI that meets or exceeds human capabilities - artificial general intelligence, or AGI - could come by 2030. What they're saying: In an interview with Axios' Mike Allen, Hassabis assessed the risk from a number of "catastrophic outcomes" of AI misuse as the technology develops, particularly "energy or water cyberterror." "That's probably almost already happening now, I would say, maybe not with very sophisticated AI yet, but I think that's the most obvious vulnerable vector," he said.
Artificial intelligence
fromAxios
3 weeks ago

Exclusive: Palo Alto Networks CEO says AI demands a new focus on threat detection

Case in point: Palo Alto finalized a $25 billion deal to buy Israeli cybersecurity firm CyberArk in July, giving the Silicon Valley firm access to a leader in the identity security and management space for people, machines and AI agents. The deal highlights how, regardless of how good an AI model is, no one can win the AI race without solid supporting services.
Tech industry
Artificial intelligence
fromFortune
3 weeks ago

As AI impersonation spikes, this startup just raised $28M to stop deepfakes in real time | Fortune

A startup uses device telemetry and network diagnostics to detect and block real-time AI-powered impersonation attacks.
Information security
fromNextgov.com
3 weeks ago

Palo Alto Networks offers discounted cybersecurity solutions to agencies through OneGov deal

GSA secured discounted Palo Alto Networks cybersecurity services for federal agencies—including AI security, cloud protection, next‑gen firewalls, and zero‑trust—available through January 31, 2028.
Information security
fromChannelPro
3 weeks ago

Pure Storage's expanded partner ecosystem helps fuel Q3 growth

Pure Storage reported robust Q3 fiscal 2026 growth with $964.5M revenue, record operating profit, expanded partner ecosystem, integrated cybersecurity/data protection, and new AI and cloud products.
Information security
fromComputerWeekly.com
3 weeks ago

Western coalition supplying tech to Ukraine prepared for long war | Computer Weekly

Western-supported coalition supplied over €1.3bn in telecoms and IT equipment enabling Ukraine's government and critical services to remain operational despite Russian cyber and kinetic attacks.
Tech industry
fromBusiness Insider
3 weeks ago

This company gives away free trips and luxury cars to its top employees every year

ThreatLocker awards its two most collaborative employees luxury cars annually and rewards fourteen to sixteen top performers with an all-expenses-paid group trip.
Information security
fromComputerWeekly.com
3 weeks ago

In 2026, collaboration, honesty and humility in cyber are key | Computer Weekly

Cyber risk is shared across suppliers, operators, cloud and AI platforms, and connected devices, making continuity and resilience primary security concerns.
fromComputerWeekly.com
3 weeks ago

UK government pledges to rewrite Computer Misuse Act | Computer Weekly

Speaking on 3 December at the Financial Times Cyber Resilience Summit 2025, security minister Dan Jarvis said: "We've heard the criticisms about the Computer Misuse Act, and how it can leave many cyber security experts feeling constrained in the activity that they can undertake. These researchers play an important role in increasing the resilience of UK systems, and securing them from unknown vulnerabilities."
Law
fromComputerWeekly.com
3 weeks ago

NCSC and BT block a billion dangerous clicks | Computer Weekly

Quietly launched earlier this year, Share and Defend collates data gleaned from public reports made to the NCSC, industry threat intelligence experts, protective domain name service (PDNS) providers and takedown actions. These datasets are then shared with internet service provider (ISP) partners, which in turn filter them through their own DNS platforms to stop their customers from accessing malicious websites.
Information security
Digital life
fromComputerWeekly.com
3 weeks ago

UK national security strategy failing to account for online world | Computer Weekly

The UK national security strategy fails to treat digital life as central, leaving novel online threats insufficiently addressed.
fromwww.dw.com
3 weeks ago

Indian government uninstalls preloaded security app plan DW 12/03/2025

The Communications Ministry said in a Wednesday statement that the "[g]overnment has decided not to make the pre-installation mandatory for mobile manufacturers." "The app is secure and purely meant to help citizens from bad actors in the cyber world," the statement said, adding that it was dropping the directive because the app was becoming very popular anyway, with 600,000 downloads of the app, called Sanchar Saathi ("communication partner"), since Tuesday.
World news
[ Load more ]