#ioxt-alliance

[ follow ]
#cybersecurity
fromTechSpot
4 days ago
Information security

Hackers are turning home routers into tools to spy on Microsoft 365 users

Privacy technologies
fromYahoo Tech
3 days ago

Hackers Are Using Your Home Router to Spy on Microsoft 365 Users

Russian spies exploited consumer routers to steal Microsoft 365 credentials from thousands of users, turning home devices into espionage tools.
Information security
fromTechSpot
4 days ago

Hackers are turning home routers into tools to spy on Microsoft 365 users

Forest Blizzard hackers exploit insecure routers to compromise devices and intercept traffic, targeting Microsoft 365 domains for sensitive data.
#digital-sovereignty
fromInfoQ
3 weeks ago
Information security

Architecting Portable Systems on Open Standards for Digital Sovereignty

Europe politics
fromTheregister
13 hours ago

Digital sovereignty isn't just a buzzword - it's the future

European governments and companies are prioritizing digital sovereignty due to concerns over US control and dependency.
Information security
fromInfoQ
3 weeks ago

Architecting Portable Systems on Open Standards for Digital Sovereignty

Digital sovereignty involves having a valid 'Plan B' for critical systems to avoid reliance on single vendors.
#smart-tvs
EU data protection
fromTheregister
2 weeks ago

Smart TVs and voice assistants are the next gatekeepers

Smart TVs and voice assistants are becoming major gatekeepers in content access, prompting calls for regulatory oversight under the Digital Markets Act.
Digital life
fromEarth911
5 days ago

Guest Idea: Why Sustainable Home Tech Choices Also Need Cybersecurity Awareness

Sustainable technology adoption is rising, but security risks of connected devices are often overlooked, impacting both environmental and digital safety.
#ai
fromTechCrunch
2 months ago
Artificial intelligence

Ring founder details the camera company's 'intelligent assistant' era | TechCrunch

Information security
fromTechzine Global
3 hours ago

Runtime security becomes critical as AI accelerates threats

Artificial intelligence accelerates innovation and cyber threats, necessitating a focus on runtime security for effective enterprise protection.
Information security
fromwww.theguardian.com
5 days ago

Anthropic says its latest AI model can expose weaknesses in software security

Claude Mythos exposes thousands of software vulnerabilities, prompting Anthropic to limit its release and collaborate with cybersecurity specialists.
fromTechCrunch
2 months ago
Artificial intelligence

Ring founder details the camera company's 'intelligent assistant' era | TechCrunch

UX design
fromMedium
6 days ago

Careful, liable UX is a thing now

Design decisions that manipulate users are being recognized as deceptive practices with significant real-life consequences.
#ring
Wearables
fromTechCrunch
1 week ago

With its new app store, Ring bets on AI to go beyond home security | TechCrunch

Amazon-owned Ring launches an app store to enhance camera capabilities, focusing on elder care, workforce analytics, and rental management.
fromFuturism
1 month ago
Privacy technologies

Hackers Working on Method to Make Ring Cameras Store Footage Locally, Never Giving It to Amazon

Wearables
fromTechCrunch
1 week ago

With its new app store, Ring bets on AI to go beyond home security | TechCrunch

Amazon-owned Ring launches an app store to enhance camera capabilities, focusing on elder care, workforce analytics, and rental management.
fromFuturism
1 month ago
Privacy technologies

Hackers Working on Method to Make Ring Cameras Store Footage Locally, Never Giving It to Amazon

fromThedrum
2 weeks ago
Online marketing

Securing the Future of the Internet: How Collaborative Marketing can Help

Ad blocking technology is growing, prompting a need for marketers to evolve their strategies to engage consumers meaningfully.
Information security
fromThe Hacker News
5 days ago

Shrinking the IAM Attack Surface through Identity Visibility and Intelligence Platforms (IVIP)

Enterprise IAM faces fragmentation, leading to Identity Dark Matter and a significant gap in visibility and security oversight.
Apple
fromThe Verge
3 weeks ago

Ikea tried to build a smart home for everyone - here's why it's not working yet

Ikea's affordable Matter-over-Thread smart home products face significant connectivity and onboarding issues across multiple platforms despite promising accessibility and reliability.
Gadgets
fromwww.engadget.com
3 weeks ago

Aqara's Matter-compatible camera promises easier smart home integration

Aqara launches the first Matter-certified camera, the G350, enabling cross-brand smart home device control through a unified hub, alongside the G400 doorbell camera compatible with major platforms.
Digital life
fromGadget Review
4 weeks ago

Your Devices Spy Today, Tomorrow They Will Make Decisions Behind Your Back

Surveillance technology embedded in smart TVs, phones, and digital devices prioritizes advertiser profit and engagement metrics over user privacy and genuine preferences.
Gadgets
fromgizmodo.com
4 weeks ago

Level Lock Pro Review: As Good as a Secret Smart Lock Gets

Level Lock Pro is a premium smart lock prioritizing aesthetic design over typical smart lock features, offering invisible integration with traditional deadbolts while sacrificing biometric authentication.
Privacy technologies
fromMakeUseOf
4 weeks ago

Your smart TV is snitching on your watch history - here's how to stop it completely

Smart TVs track viewing habits through Automated Content Recognition to provide personalized recommendations, but users can disable this feature in settings to protect privacy.
fromSecurityWeek
2 weeks ago

TP-Link Patches High-Severity Router Vulnerabilities

CVE-2025-15517 allows attackers to bypass authentication and perform actions such as firmware uploads or configuration operations, according to TP-Link's advisory.
Information security
Marketing tech
fromExchangewire
1 month ago

EXTE Joins Forces with HUMAN Security to Protect Ad Inventory Quality & Integrity

EXTE integrated HUMAN Security's MediaGuard fraud detection solution to validate ad inventory, reduce invalid traffic and bot activity, and ensure only quality placements reach buyers.
EU data protection
fromPrivacy International
1 month ago

Our key achievements from 2025

Organizations successfully challenged governments and corporations on data exploitation and technology misuse, achieving regulatory compliance rulings and policy reforms that protect hundreds of millions of people globally.
fromZDNET
1 month ago

Firewalla Orange review: This router gave my home network a meaningful security upgrade

I see a lot of people referring to Firewalla hardware as a firewall or security tool, and while that's correct, it also offers so much more. Think of the tech as having your very own personal network administrator, making even complex networking tasks as simple as flicking a virtual switch.
Gadgets
fromTechCrunch
1 month ago

Ring's Jamie Siminoff has been trying to calm privacy fears since the Super Bowl, but his answers may not help | TechCrunch

It is no different than finding a dog in your backyard, looking at the collar and deciding whether or not to call the number. The feature at the center of the controversy is fairly mundane on the surface - a dog goes missing; Ring alerts nearby camera owners to ask whether the animal shows up in their footage; users can respond or ignore the request entirely and stay invisible to everyone involved.
Privacy technologies
Mobile UX
fromWIRED
1 month ago

The 'European' Jolla Phone Is an Anti-Big-Tech Smartphone

Sailfish OS offers a Linux-based alternative to Android that eliminates Google dependencies while maintaining Android app compatibility, positioning itself as a sovereignty-focused operating system compiled and installed in Finland.
Privacy professionals
fromWIRED
1 month ago

Time to Ditch Your Ring Doorbell? Here Are the Best Privacy-Minded Alternatives

Video doorbell footage poses privacy risks through unauthorized access, government surveillance, and potential misuse for racial profiling, though legal protections exist for refusing police requests without warrants.
Privacy technologies
fromThe Queen Zone
1 month ago

13 ways your smart tv may be tracking you and what you can do about It

Over 80% of U.S. households own internet-connected televisions that track viewing habits, voice commands, and app usage, converting entertainment devices into behavioral tracking tools for advertising and analytics networks.
Information security
fromTechRepublic
4 weeks ago

Industrial Systems Under Siege: 77% of OT Environments Suffer Cyber Breaches

Industrial sectors lag in cybersecurity despite modernizing operational technologies, creating critical vulnerabilities in manufacturing, utilities, and energy infrastructure.
#nato-security-certification
Tech industry
fromMedium
2 months ago

Zigbee : A Comprehensive Overview on Protocol Stack

Zigbee provides low-power, low-data-rate wireless mesh networking with layered security and long battery life for smart home and sensor applications.
Artificial intelligence
fromTechzine Global
2 months ago

CM.com and VOLT build sovereign AI environment for Europe

CM.com and VOLT will deliver European, sovereign AI infrastructure combining VOLT's AI data centers and GPUs with CM.com's AI platform for compliant, energy-efficient solutions.
fromArs Technica
1 month ago

What happens to a car when the company behind its software goes under?

As vehicles become platforms for software and subscriptions, their longevity is increasingly tied to the survival of the companies behind their code. When those companies fail, the consequences ripple far beyond a bad app update and into the basic question of whether a car still functions as a car. Over the years, automotive software has expanded from performing rudimentary engine management and onboard diagnostics to powering today's interconnected, software-defined vehicles.
Cars
fromTheregister
2 months ago

Matrix messaging gaining ground in government IT

FOSDEM 2026 Amid growing interest in digital sovereignty and getting data out of the corporate cloud and into organizations' ownership, the Matrix open communication protocol is thriving. The project was co-founded by Matthew Hodgson and Amandine le Pape, and The Reg FOSS desk met both at this year's FOSDEM for a chat about what's happening with Matrix. The Register has covered Matrix and its commercial Element side quite a few times over the years,
Software development
fromNextgov.com
2 months ago

Trust, trade and the new data diplomacy

Data has become the defining currency of global power. The nations and organizations that can manage, protect, and share it responsibly will shape the future of economic resilience and international cooperation. In an era where artificial intelligence and digital interdependence connect every market and mission, the ability to build and maintain trust in data is now a central pillar of both commerce and diplomacy.
World news
Information security
fromTechzine Global
1 month ago

Sovereign: the new normal for AI and cloud native (and how to make it work)

Sovereign cloud and AI deployments require organizations to maintain complete control over data location, infrastructure operations, and access, fundamentally changing Kubernetes operational requirements and threat models.
Gadgets
fromThe Verge
1 month ago

The smart lock standard that could replace your keys is finally here

Aliro, an open smart lock standard, enables any smartphone to unlock any compatible smart lock via digital keys stored in phone wallets, eliminating manufacturer fragmentation.
Gadgets
fromYanko Design - Modern Industrial Design News
1 month ago

Arduino's $61 Matter Bundle Lets You Build Smart Home Devices That Work With Apple, Google, and Amazon - Yanko Design

Arduino's Matter Discovery Bundle enables DIY smart home device creation at $61.04, solving platform fragmentation by providing universal connectivity to Apple HomeKit, Google Home, Amazon Alexa, and Home Assistant.
Privacy professionals
fromApp Developer Magazine
1 year ago

Clean Data Alliance launches to promote human controlled data economy

Digital economy should be rebuilt on consent-based, anonymous, longitudinal, verified Clean Data so individuals control, share, and profit from their own data.
fromGSMArena.com
2 months ago

Here's what the Xiaomi Tag looks like, main specs spotted in HyperOS code

Last month, a report claimed the Xiaomi Tag was in development, basically intended to be the Chinese company's version of Apple's AirTag and Motorola's Moto Tag.
Mobile UX
fromEntrepreneur
2 months ago

AI Can Delete Your Data. Here's Your Prevention Plan.

Never feel that you are totally safe. In July 2025, one company learned the hard way after an AI coding assistant it dearly trusted from Replit ended up breaching a "code freeze" and implemented a command that ended up deleting its entire product database. This was a huge blow to the staff. It effectively meant that months of extremely hard work, comprising 1,200 executive records and 1,196 company records, ended up going away.
Artificial intelligence
#smart-home-security
fromZDNET
1 month ago
Privacy technologies

Your smart home may be at risk - 6 ways experts protect your devices from attacks

fromZDNET
2 months ago
Privacy technologies

Should you be afraid of smart home hacking? What it is, and how experts prevent it

fromZDNET
1 month ago
Privacy technologies

Your smart home may be at risk - 6 ways experts protect your devices from attacks

fromZDNET
2 months ago
Privacy technologies

Should you be afraid of smart home hacking? What it is, and how experts prevent it

fromReason.com
2 months ago

How to build your own internet in 2026

The internet you experience daily-endless scrolling, algorithmic feeds serving content you didn't ask for, AI-generated slop clogging search results-isn't the only internet available. It's just the one that's easiest to stumble into. You're not stuck with the internet that has evolved alongside the rise of hegemonic platforms. We're 20-plus years into the social internet, and the winners of the last round of audience capture have made clear they're shifting to optimize for social broadcasting instead of networking, to maximize market share and market cap.
Digital life
EU data protection
fromTechzine Global
1 month ago

Trusted Tech Alliance establishes five principles for secure technology

Sixteen global tech companies formed the Trusted Tech Alliance to embed transparency, security, and data protection across the entire technology stack.
Apple
fromThe Verge
2 months ago

Apple is killing the old HomeKit tomorrow

Update Apple Home before February 10, 2026 to maintain smart-home control; iPads stop serving as hubs and devices must run iOS 16.2 or later.
fromWIRED
2 months ago

What Is Thread? We Explain the Smart Home Network Protocol

Originally developed by Nest (before the Google acquisition), Thread has existed since 2011. Devised as a power-efficient mesh networking technology for internet-of-things (IoT) products, Thread gathered pace after the 2014 formation of the Thread Group, which develops the technology and drives its adoption as an industry standard. Founding members like ARM, Samsung, Google, and Qualcomm have been joined by Apple, Amazon, and many other big companies over the years.
Gadgets
Privacy professionals
fromExchangewire
1 month ago

EscalaX Reinforces its Privacy & Compliance With BidSafe One

EscalaX partners with BidSafe One to strengthen privacy, consent management, and regulatory compliance across programmatic advertising, ensuring secure multichannel data governance.
Information security
fromSecurityWeek
1 month ago

Honeywell, Researcher Clash Over Impact of Building Controller Vulnerability

A researcher discovered that Honeywell's IQ4 building controller exposes unauthenticated web interfaces and allows remote administrator account creation, but Honeywell disputes the severity, claiming the vulnerability only exists during installation before the system becomes operational.
Privacy technologies
fromMedium
1 month ago

The design failures of consumer IoT

Essential anti-theft features in IoT devices are increasingly locked behind paywalls, leaving users vulnerable when subscriptions expire and data collection stops.
Apple
fromArs Technica
2 months ago

Smart home PSA: Apple's "new architecture" for Home app becomes mandatory today

Switching to Apple's updated Home architecture requires updating devices to supported OS versions and requires a HomePod or modern Apple TV as the home hub.
Privacy professionals
fromInfoQ
2 months ago

MyTerms: A New IEEE Standard Enabling Online Privacy and Aiming to Replace Cookies

MyTerms gives individuals machine-readable, enforceable privacy terms that travel with them, turning accepted terms into legally binding contracts and replacing cookie notices.
EU data protection
fromTechzine Global
1 month ago

Metadata, cloud sovereignty's weak spot

US authorities can access some metadata of cloud users in European sovereign clouds, potentially revealing operational and behavioral information despite data residency protections.
fromEngadget
2 months ago

Ring can now verify if a video has been altered

Ring has launched a new tool that can tell you if a video clip captured by its camera has been altered or not. The company says that every video downloaded from Ring starting in December 2025 going forward will come with a digital security seal. "Think of it like the tamper-evident seal on a medicine bottle," it explained. Its new tool, called Ring Verify, can tell you if a video has been altered in any way.
Gadgets
fromZDNET
2 months ago

Your default home Wi-Fi setup isn't nearly as private as it should be - 6 free ways to improve it

We live in a time where privacy is something we actually have to work to enjoy. Achieving a level of privacy we once had takes work, and you need to start thinking beyond a single desktop, laptop, tablet, or phone -- all the way to your LAN. Before I scare you all off, understand that this starts on the desktop and extends to the LAN. By beefing up both your devices and your network, you'll achieve a level of privacy that you wouldn't otherwise have.
Privacy technologies
Gadgets
fromTechCrunch
2 months ago

Ring is adding a new content verification feature to videos | TechCrunch

Ring Verify will indicate whether Ring camera videos have been altered, alert recipients to edits, and allow requesting unedited original footage.
fromSecurityWeek
1 month ago

Critical Flaws Exposed Gardyn Smart Gardens to Remote Hacking

According to CISA, Gardyn products were affected by two critical and two high-severity vulnerabilities. One of the critical flaws, tracked as CVE-2025-29631, is a command injection issue that can be exploited to execute arbitrary OS commands on the targeted device. The second critical vulnerability, CVE-2025-1242, is related to the exposure of hardcoded admin credentials that can be used to gain full control of the Gardyn IoT Hub.
Information security
Gadgets
fromZDNET
2 months ago

This smart home breakthrough lets you control appliances without Wi-Fi (and its security risks)

Emerson's SmartVoice enables on-device voice control for fans, heaters, air fryers, and plugs without Wi‑Fi or a hub, reducing privacy and cyberattack risks.
fromThe Atlantic
2 months ago

Smart Homes Are Terrible

All of the appliances and systems are brand-new: the HVAC, the lighting, the entertainment. Touch screens of various shapes and sizes control this, that, and the other. Rows of programmable buttons sit where traditional light switches would normally be. The kitchen even has outlets designed to rise up from the countertop when you need them, and slide away when you don't.
Gadgets
Privacy technologies
fromTechCrunch
2 months ago

WhatsApp is rolling out a new stricter security setting to protect users from cyber attacts | TechCrunch

WhatsApp added Strict Account Settings to lock profiles, block unknown media and calls, enable two-step verification, and limit group additions to reduce cyberattack risk.
fromSecuritymagazine
1 month ago

Plenty of Associations, But Not Enough Association

I belong to six professional organizations. Or maybe it's 13, 19, 26, or 47. I can't be sure. The ones where I pay dues or volunteer I know well: ASIS International, the Life Safety Alliance, Chartered Security Professionals, and a couple of others. Then come the niche and industry-specific associations like the International Council of Shopping Centers, public-private partnerships such as OSAC and Infragard, and the countless ASIS Communities.
Information security
Privacy technologies
fromFast Company
2 months ago

This new privacy-focused phone service is designed to keep your phone from getting hacked

Cape is a US-wide privacy-focused cellphone carrier that prevents SIM swapping and IMSI-catcher surveillance while minimizing customer data collection and encrypting voicemails.
Gadgets
fromZDNET
2 months ago

Are your Bluetooth devices missing these key features? Here's why - and who to blame

Bluetooth 6.2 adds capabilities, but manufacturers choose which features to implement, so advertised Bluetooth versions do not guarantee feature availability.
fromSecurityWeek
2 months ago

Indurex Emerges From Stealth to Close Security Gap in Cyber-Physical Systems

The Indurex platform ingests and correlates data from multiple sources across the cyber-physical stack, with a strong focus on industrial historians, instrumentation and asset management systems (IAMS), alarm management, and OT network and endpoint data. The platform, which can be integrated with third-party OT security solutions, is designed to unify cyber, process, and safety context into a single operational view, using adaptive risk scoring to highlight issues and prioritize response actions.
Information security
Gadgets
fromComputerWeekly.com
1 month ago

Direct-to-device connectivity set to underpin next generation of industrial IoT | Computer Weekly

Ubiquitous satellite direct-to-device (D2D) connectivity will drive rapid, near-term mass adoption in industrial IoT across agriculture, mining, energy, transport and utilities.
fromSecurityWeek
2 months ago

Access System Flaws Enabled Hackers to Unlock Doors at Major European Firms

Vulnerabilities discovered by researchers in Dormakaba physical access control systems could have allowed hackers to remotely open doors at major organizations. The security holes were discovered by experts at SEC Consult, a cybersecurity consulting firm under Atos-owned Eviden, in Dormakaba's Exos central management software, a hardware access manager, and registration units that enable entry via a keypad, fingerprint reader, or chip card.
Information security
Information security
fromSecurityWeek
2 months ago

Organizations Urged to Replace Discontinued Edge Devices

End-of-support edge devices create major security risks and must be identified and replaced promptly to prevent exploitation by state-sponsored threat actors.
Information security
fromArs Technica
1 month ago

OpenClaw security fears lead Meta, other AI firms to restrict its use

OpenClaw poses significant security risks; organizations must restrict access, mitigate exposures immediately, and test in controlled environments to identify vulnerabilities.
Information security
fromTechzine Global
2 months ago

Secure networking: the foundation for the AI era

Organizations must modernize and simplify networks, strengthen security, and automate to maintain resilience against increasingly sophisticated, fast-moving cyberattacks and AI-driven pressure.
Information security
fromComputerWeekly.com
2 months ago

Cyber body ISC2 signs on as UK software security ambassador | Computer Weekly

ISC2 joined the UK Software Security Ambassador Scheme to advise on promoting secure-by-design practices and supporting adoption of the Software Security Code of Practice.
Information security
fromSilicon Canals
1 month ago

ITC Secure and IronNet Unite to Form Collective Defence, a New Force in Critical Infrastructure Protection Against Hybrid Warfare - Silicon Canals

Collective Defence combines ITC Secure and IronNet to protect critical infrastructure from state-sponsored and hybrid threats using AI-driven cybersecurity and collaborative threat sharing.
[ Load more ]