96% of Online Pharmacies Operate Illegally, Posing Global Health Risks
A U.S. Trade Representative's report found that 96% of the world's 35,000 online pharmacies are illegal, leading to risks of ineffective or dangerous drugs; at least nine people died from counterfeit opioid pills sold through fake online drugstores between August 2023 and June 2024.
96% of Online Pharmacies Operate Illegally, Posing Global Health Risks
A U.S. Trade Representative's report found that 96% of the world's 35,000 online pharmacies are illegal, leading to risks of ineffective or dangerous drugs; at least nine people died from counterfeit opioid pills sold through fake online drugstores between August 2023 and June 2024.
Progress
48% Bias Score
Alleged Rosreestr Data Breach Raises Concerns in Russia
Hackers claim a 2 billion record data breach from Russia's Rosreestr, partially verified by a news outlet; Rosreestr denies the breach but is investigating, raising concerns about data security and access restrictions implemented in 2022 and 2023.
Alleged Rosreestr Data Breach Raises Concerns in Russia
Hackers claim a 2 billion record data breach from Russia's Rosreestr, partially verified by a news outlet; Rosreestr denies the breach but is investigating, raising concerns about data security and access restrictions implemented in 2022 and 2023.
Progress
36% Bias Score
China-Linked Hacking Group Targeted Japan in Over 200 Cyberattacks
Japan's National Police Agency linked over 200 cyberattacks from 2019-2024 to a Chinese hacking group, MirrorFace, targeting national security and high-technology data from government ministries, private companies, and individuals, using malware-laced emails and VPN vulnerabilities.
China-Linked Hacking Group Targeted Japan in Over 200 Cyberattacks
Japan's National Police Agency linked over 200 cyberattacks from 2019-2024 to a Chinese hacking group, MirrorFace, targeting national security and high-technology data from government ministries, private companies, and individuals, using malware-laced emails and VPN vulnerabilities.
Progress
48% Bias Score
US Launches Cybersecurity Label for Internet-Connected Devices
The White House announced the U.S. Cyber Trust Mark, a voluntary program labeling internet-connected products meeting basic cybersecurity standards; starting in 2025, consumers can identify safer products, with federal agencies mandated to use only labeled products starting in 2027.
US Launches Cybersecurity Label for Internet-Connected Devices
The White House announced the U.S. Cyber Trust Mark, a voluntary program labeling internet-connected products meeting basic cybersecurity standards; starting in 2025, consumers can identify safer products, with federal agencies mandated to use only labeled products starting in 2027.
Progress
36% Bias Score
Critical Android Vulnerabilities Require Urgent Updates
Google's January 6th Android security bulletin details five critical vulnerabilities (CVE-2024-43096, CVE-2024-43770, CVE-2024-43771, CVE-2024-49747, CVE-2024-49748) affecting Android versions 12-15, potentially enabling remote code execution; users should update to security patch level 2025-01-05 o...
Critical Android Vulnerabilities Require Urgent Updates
Google's January 6th Android security bulletin details five critical vulnerabilities (CVE-2024-43096, CVE-2024-43770, CVE-2024-43771, CVE-2024-49747, CVE-2024-49748) affecting Android versions 12-15, potentially enabling remote code execution; users should update to security patch level 2025-01-05 o...
Progress
40% Bias Score
Taiwan Investigates Suspected Undersea Cable Damage
Taiwan's coast guard suspects a Cameroon- and Tanzania-registered ship, crewed by Chinese nationals and owned by a Hong Kong-based company, damaged an undersea cable northeast of the island; bad weather prevented investigation, and the ship sailed to South Korea; Taiwan requested South Korea's help.
Taiwan Investigates Suspected Undersea Cable Damage
Taiwan's coast guard suspects a Cameroon- and Tanzania-registered ship, crewed by Chinese nationals and owned by a Hong Kong-based company, damaged an undersea cable northeast of the island; bad weather prevented investigation, and the ship sailed to South Korea; Taiwan requested South Korea's help.
Progress
44% Bias Score
AI's Transformative Impact on Telecommunications
AI is revolutionizing the telecommunications industry by optimizing network performance through predictive maintenance and real-time issue resolution, enhancing customer service via AI-powered chatbots, and personalizing marketing campaigns based on individual usage patterns, ultimately improving ef...
AI's Transformative Impact on Telecommunications
AI is revolutionizing the telecommunications industry by optimizing network performance through predictive maintenance and real-time issue resolution, enhancing customer service via AI-powered chatbots, and personalizing marketing campaigns based on individual usage patterns, ultimately improving ef...
Progress
40% Bias Score
BEC Scam Highlights Email Security Vulnerabilities
Teresa W. almost lost thousands of dollars in a BEC scam where hackers accessed her email, created an Outlook rule to forward fraudulent emails to her banker, and impersonated her to initiate a wire transfer; her banker's vigilance prevented the loss.
BEC Scam Highlights Email Security Vulnerabilities
Teresa W. almost lost thousands of dollars in a BEC scam where hackers accessed her email, created an Outlook rule to forward fraudulent emails to her banker, and impersonated her to initiate a wire transfer; her banker's vigilance prevented the loss.
Progress
44% Bias Score
China Exposes Foreign Spy Ring Using Social Media for Recruitment
The Chinese Ministry of State Security (MSS) exposed multiple cases of foreign spies using social media to obtain phone numbers and recruit unwitting individuals for espionage, highlighting the growing sophistication of these operations.
China Exposes Foreign Spy Ring Using Social Media for Recruitment
The Chinese Ministry of State Security (MSS) exposed multiple cases of foreign spies using social media to obtain phone numbers and recruit unwitting individuals for espionage, highlighting the growing sophistication of these operations.
Progress
64% Bias Score
Turkey Establishes New Cyber Security Presidency
Turkey created a new Cyber Security Presidency, directly responsible to the President, with a dedicated budget and 135 positions, replacing the Presidential Administrative Affairs Presidency and reinstating the General Secretariat; its mission includes cybersecurity strategy, international collabora...
Turkey Establishes New Cyber Security Presidency
Turkey created a new Cyber Security Presidency, directly responsible to the President, with a dedicated budget and 135 positions, replacing the Presidential Administrative Affairs Presidency and reinstating the General Secretariat; its mission includes cybersecurity strategy, international collabora...
Progress
36% Bias Score
HIPAA Security Rule Updates Mandate Enhanced Documentation and Technical Safeguards
The HHS Office for Civil Rights (OCR) proposed updates to the HIPAA Security Rule aim to boost ePHI cybersecurity, mandating enhanced documentation (including a technology asset inventory and 72-hour system restore plans) and stronger technical safeguards (encryption, multi-factor authentication, vu...
HIPAA Security Rule Updates Mandate Enhanced Documentation and Technical Safeguards
The HHS Office for Civil Rights (OCR) proposed updates to the HIPAA Security Rule aim to boost ePHI cybersecurity, mandating enhanced documentation (including a technology asset inventory and 72-hour system restore plans) and stronger technical safeguards (encryption, multi-factor authentication, vu...
Progress
40% Bias Score
FBI Warns of Surge in AI-Powered Deepfake Scams
The FBI issued a warning about criminals using AI-generated deepfakes for scams, detailing 17 techniques including voice cloning, fake video calls, and impersonation of authority figures; individuals should limit online presence, verify communications, and use strong passwords.
FBI Warns of Surge in AI-Powered Deepfake Scams
The FBI issued a warning about criminals using AI-generated deepfakes for scams, detailing 17 techniques including voice cloning, fake video calls, and impersonation of authority figures; individuals should limit online presence, verify communications, and use strong passwords.
Progress
52% Bias Score