Showing 277 to 288 of 1,200 results


FBI Urges Two-Factor Authentication Amidst Rising AI-Powered Cybercrime
The FBI advises implementing two-factor authentication across all accounts due to increasingly sophisticated cyberattacks using AI, following warnings from Google about cybercrime's national security implications; Operation Level Up recovered \$285 million for 4,000 victims.
FBI Urges Two-Factor Authentication Amidst Rising AI-Powered Cybercrime
The FBI advises implementing two-factor authentication across all accounts due to increasingly sophisticated cyberattacks using AI, following warnings from Google about cybercrime's national security implications; Operation Level Up recovered \$285 million for 4,000 victims.
Progress
32% Bias Score


Five Key Business Tech Trends: Security, AI, and Market Dynamics
This week's business tech news covers Gmail's shift from SMS to QR code 2FA, OpenAI's cheaper Deep Research tool, Windows' Network Protection feature, Snapchat's SMB success, and AI's integration into factory operations.
Five Key Business Tech Trends: Security, AI, and Market Dynamics
This week's business tech news covers Gmail's shift from SMS to QR code 2FA, OpenAI's cheaper Deep Research tool, Windows' Network Protection feature, Snapchat's SMB success, and AI's integration into factory operations.
Progress
12% Bias Score


German Scientist Creates Open-Source Tool to Protect User Data in AI Services
Frank Börncke, a German computer scientist, developed the open-source tool "Private Prompts" to protect user data when interacting with AI services like Chat-GPT by pseudonymising personal information before transmission, addressing data privacy concerns.
German Scientist Creates Open-Source Tool to Protect User Data in AI Services
Frank Börncke, a German computer scientist, developed the open-source tool "Private Prompts" to protect user data when interacting with AI services like Chat-GPT by pseudonymising personal information before transmission, addressing data privacy concerns.
Progress
48% Bias Score


Google's Pixel Update: Scam Detection vs. Samsung's Android 15 Delay
Google's March Pixel update includes a new scam detection feature using real-time call scanning to identify fraudulent patterns, contrasting with Samsung's delayed Android 15 update, creating a significant gap in OS updates and security.
Google's Pixel Update: Scam Detection vs. Samsung's Android 15 Delay
Google's March Pixel update includes a new scam detection feature using real-time call scanning to identify fraudulent patterns, contrasting with Samsung's delayed Android 15 update, creating a significant gap in OS updates and security.
Progress
52% Bias Score


Cáceres Cyber-Predator Arrest Uncovers Extensive Child Sexual Abuse Material
Spanish authorities arrested a cyber-predator in Cáceres after a parent reported their child's online abuse; the investigation, 'Giatros', uncovered 2.5 terabytes of child sexual abuse material involving eleven victims nationwide.
Cáceres Cyber-Predator Arrest Uncovers Extensive Child Sexual Abuse Material
Spanish authorities arrested a cyber-predator in Cáceres after a parent reported their child's online abuse; the investigation, 'Giatros', uncovered 2.5 terabytes of child sexual abuse material involving eleven victims nationwide.
Progress
36% Bias Score


North Carolina Business Owner Pleads Guilty to Illegal Export of Military Technology to China
David Bohmerwald, owner of Components Cooper Inc. in Raleigh, North Carolina, pleaded guilty to illegally attempting to export 100 accelerometers with military applications to China, falsely declaring their value, and faces up to 20 years in prison.
North Carolina Business Owner Pleads Guilty to Illegal Export of Military Technology to China
David Bohmerwald, owner of Components Cooper Inc. in Raleigh, North Carolina, pleaded guilty to illegally attempting to export 100 accelerometers with military applications to China, falsely declaring their value, and faces up to 20 years in prison.
Progress
40% Bias Score

US-Russia Tech Relations: A Digital Divide
A recent meeting between President Zelensky and the Trump administration on February 28, 2025, has sparked debate over potential US-Russia rapprochement, but Russia's push for digital self-reliance and reduced reliance on Western technology presents significant challenges for US tech companies.

US-Russia Tech Relations: A Digital Divide
A recent meeting between President Zelensky and the Trump administration on February 28, 2025, has sparked debate over potential US-Russia rapprochement, but Russia's push for digital self-reliance and reduced reliance on Western technology presents significant challenges for US tech companies.
Progress
44% Bias Score

Dark Web Hackers Sell Access to Small Businesses for \$600
A Guardz report reveals hackers are selling access to small business networks, especially accounting and law firms, on the dark web for \$600, exploiting unpatched vulnerabilities, stolen credentials, and ransomware; this highlights the growing threat to SMBs due to limited cybersecurity resources.

Dark Web Hackers Sell Access to Small Businesses for \$600
A Guardz report reveals hackers are selling access to small business networks, especially accounting and law firms, on the dark web for \$600, exploiting unpatched vulnerabilities, stolen credentials, and ransomware; this highlights the growing threat to SMBs due to limited cybersecurity resources.
Progress
44% Bias Score

Solar Power Systems Vulnerable to Cyberattacks Due to Weak Passwords
A report reveals that easily guessable passwords and vulnerable software leave solar power systems, from rooftop installations to large plants, vulnerable to cyberattacks, potentially causing widespread energy disruptions and severe economic damage.

Solar Power Systems Vulnerable to Cyberattacks Due to Weak Passwords
A report reveals that easily guessable passwords and vulnerable software leave solar power systems, from rooftop installations to large plants, vulnerable to cyberattacks, potentially causing widespread energy disruptions and severe economic damage.
Progress
48% Bias Score

Quebec Cybersecurity Minister Resigns Amid \$500 Million SAAQclic Scandal
Quebec Premier François Legault replaced his cybersecurity minister, Éric Caire, after an auditor general's report revealed at least \$500 million in cost overruns for the SAAQclic online platform, causing delays and long lines at service centers; the opposition demands a public inquiry.

Quebec Cybersecurity Minister Resigns Amid \$500 Million SAAQclic Scandal
Quebec Premier François Legault replaced his cybersecurity minister, Éric Caire, after an auditor general's report revealed at least \$500 million in cost overruns for the SAAQclic online platform, causing delays and long lines at service centers; the opposition demands a public inquiry.
Progress
36% Bias Score

US Halts Offensive Cyber Operations Against Russia
Following a US-Russia meeting aimed at de-escalating tensions, US Cyber Command halted all offensive cyber operations against Russia, impacting roughly 2,000 personnel focused on Russia, per an order from Pentagon chief Pete Hegseth; however, intelligence gathering continues through the National Sec...

US Halts Offensive Cyber Operations Against Russia
Following a US-Russia meeting aimed at de-escalating tensions, US Cyber Command halted all offensive cyber operations against Russia, impacting roughly 2,000 personnel focused on Russia, per an order from Pentagon chief Pete Hegseth; however, intelligence gathering continues through the National Sec...
Progress
48% Bias Score

Cybersecurity Crisis: Urgent Call to Delete Passwords and Adopt Passkeys
The alarming rise in cyberattacks targeting passwords and SMS-based 2FA necessitates a complete shift to passkeys, with the U.S. government and Google leading the charge to eliminate vulnerable authentication methods, highlighting the urgent need for users to delete passwords alongside adopting pass...

Cybersecurity Crisis: Urgent Call to Delete Passwords and Adopt Passkeys
The alarming rise in cyberattacks targeting passwords and SMS-based 2FA necessitates a complete shift to passkeys, with the U.S. government and Google leading the charge to eliminate vulnerable authentication methods, highlighting the urgent need for users to delete passwords alongside adopting pass...
Progress
52% Bias Score
Showing 277 to 288 of 1,200 results