Showing 517 to 528 of 1,852 results


Pentagon Security Breach: Hegseth Used Unsecured Line for Signal
US Defense Secretary Pete Hegseth installed an unsecured internet connection in his office to use the encrypted messaging app Signal on his personal computer, bypassing Pentagon security protocols and potentially exposing sensitive information, according to anonymous sources at AP and ABC News.
Pentagon Security Breach: Hegseth Used Unsecured Line for Signal
US Defense Secretary Pete Hegseth installed an unsecured internet connection in his office to use the encrypted messaging app Signal on his personal computer, bypassing Pentagon security protocols and potentially exposing sensitive information, according to anonymous sources at AP and ABC News.
Progress
48% Bias Score


Dutch Climate Plan Unveiled Amid Royal Honors Controversy and Pentagon Security Breach
The Dutch cabinet presents its climate plan today, aiming to meet climate targets, while hundreds receive royal honors amid controversy; US Defense Secretary Hegseth used an unsecured internet connection in his office, bypassing Pentagon security.
Dutch Climate Plan Unveiled Amid Royal Honors Controversy and Pentagon Security Breach
The Dutch cabinet presents its climate plan today, aiming to meet climate targets, while hundreds receive royal honors amid controversy; US Defense Secretary Hegseth used an unsecured internet connection in his office, bypassing Pentagon security.
Progress
16% Bias Score


Dutch Climate Plan Unveiled Amidst Royal Decorations Controversy
The Dutch cabinet presents its climate plan today, aiming to meet legal climate goals, while hundreds receive royal decorations, amidst controversy surrounding Minister Faber's refusal to approve five decorations for former COA volunteers; US Defense Secretary Pete Hegseth used an unsecured internet...
Dutch Climate Plan Unveiled Amidst Royal Decorations Controversy
The Dutch cabinet presents its climate plan today, aiming to meet legal climate goals, while hundreds receive royal decorations, amidst controversy surrounding Minister Faber's refusal to approve five decorations for former COA volunteers; US Defense Secretary Pete Hegseth used an unsecured internet...
Progress
12% Bias Score


Russian Espionage Targets German Eastern Europe Research Organizations
The Academic Network Eastern Europe (Akno) in Berlin has experienced increased espionage from suspected Russian intelligence, including break-ins and cyberattacks, reflecting a broader pattern of Russian repression targeting organizations and individuals critical of the Kremlin since December 2023.
Russian Espionage Targets German Eastern Europe Research Organizations
The Academic Network Eastern Europe (Akno) in Berlin has experienced increased espionage from suspected Russian intelligence, including break-ins and cyberattacks, reflecting a broader pattern of Russian repression targeting organizations and individuals critical of the Kremlin since December 2023.
Progress
28% Bias Score


EU Equips Staff with Secure Devices Amidst Heightened Geopolitical Tensions
The European Commission is equipping staff traveling to the US and other high-surveillance countries with disposable phones and secure laptops due to escalating geopolitical tensions and concerns about data security, mirroring similar restrictions on TikTok, Telegram, and other technologies.
EU Equips Staff with Secure Devices Amidst Heightened Geopolitical Tensions
The European Commission is equipping staff traveling to the US and other high-surveillance countries with disposable phones and secure laptops due to escalating geopolitical tensions and concerns about data security, mirroring similar restrictions on TikTok, Telegram, and other technologies.
Progress
36% Bias Score


IEA Summit Highlights Europe's Vulnerable Electrical Grid
An IEA summit in London highlighted Europe's weak energy security, particularly the vulnerability of its electrical grid, as seen in a London substation failure that shut down Heathrow Airport for a day. The summit urged governments to prioritize electrical security and called for diversification, p...
IEA Summit Highlights Europe's Vulnerable Electrical Grid
An IEA summit in London highlighted Europe's weak energy security, particularly the vulnerability of its electrical grid, as seen in a London substation failure that shut down Heathrow Airport for a day. The summit urged governments to prioritize electrical security and called for diversification, p...
Progress
36% Bias Score

Apple Removes Deepfake Apps After TikTok Advertising Scandal
Four apps offering to digitally remove clothing from photos were removed from Apple's AppStore after a BBC investigation revealed they were advertised on TikTok as tools to create non-consensual deepfakes; one app was downloaded over 1 million times on Google Play, and TikTok removed the ads but sim...

Apple Removes Deepfake Apps After TikTok Advertising Scandal
Four apps offering to digitally remove clothing from photos were removed from Apple's AppStore after a BBC investigation revealed they were advertised on TikTok as tools to create non-consensual deepfakes; one app was downloaded over 1 million times on Google Play, and TikTok removed the ads but sim...
Progress
60% Bias Score

Dutch Climate Plan Unveiled Amidst Royal Decoration Controversy and Pentagon Security Breach
The Dutch cabinet presents its climate plan today, while hundreds receive royal decorations amidst controversy; US Defense Secretary Hegseth used an unsecured internet connection in his office, raising security concerns; and the passing of chef Jonnie Boer is mourned.

Dutch Climate Plan Unveiled Amidst Royal Decoration Controversy and Pentagon Security Breach
The Dutch cabinet presents its climate plan today, while hundreds receive royal decorations amidst controversy; US Defense Secretary Hegseth used an unsecured internet connection in his office, raising security concerns; and the passing of chef Jonnie Boer is mourned.
Progress
16% Bias Score

AIVD: Russia's 2024 Escalation of Aggression Against Europe
The Dutch AIVD's 2024 annual report details a surge in Russian aggression against European nations, including espionage, cyberattacks, and sabotage of critical infrastructure, such as undersea cables and attacks on infrastructure in Poland and Germany, potentially amounting to state terrorism.

AIVD: Russia's 2024 Escalation of Aggression Against Europe
The Dutch AIVD's 2024 annual report details a surge in Russian aggression against European nations, including espionage, cyberattacks, and sabotage of critical infrastructure, such as undersea cables and attacks on infrastructure in Poland and Germany, potentially amounting to state terrorism.
Progress
52% Bias Score

Google Messages Adds AI-Powered Sensitive Content Warnings, Sparking Privacy Debate
Google Messages' new AI feature, enabled by default for children and optional for adults, uses on-device scanning to blur nude images and warn users, raising privacy concerns despite assurances that no data is sent to Google.

Google Messages Adds AI-Powered Sensitive Content Warnings, Sparking Privacy Debate
Google Messages' new AI feature, enabled by default for children and optional for adults, uses on-device scanning to blur nude images and warn users, raising privacy concerns despite assurances that no data is sent to Google.
Progress
56% Bias Score

Dutch Intelligence Service Reports Rise in Sophisticated Criminal Intelligence Gathering
The Dutch intelligence service AIVD's 2024 annual report reveals a significant increase in sophisticated criminal intelligence gathering targeting officials, politicians, journalists, and lawyers, utilizing advanced technology and tactics comparable to those of law enforcement, often involving bribe...

Dutch Intelligence Service Reports Rise in Sophisticated Criminal Intelligence Gathering
The Dutch intelligence service AIVD's 2024 annual report reveals a significant increase in sophisticated criminal intelligence gathering targeting officials, politicians, journalists, and lawyers, utilizing advanced technology and tactics comparable to those of law enforcement, often involving bribe...
Progress
20% Bias Score

Rapid Software Exploitation Demands Runtime Application Protection
The average time to exploit software vulnerabilities has dropped from 63 hours to 22 minutes, highlighting the inadequacy of traditional patching methods and prompting a shift towards runtime application protection for real-time threat detection and blocking.

Rapid Software Exploitation Demands Runtime Application Protection
The average time to exploit software vulnerabilities has dropped from 63 hours to 22 minutes, highlighting the inadequacy of traditional patching methods and prompting a shift towards runtime application protection for real-time threat detection and blocking.
Progress
48% Bias Score
Showing 517 to 528 of 1,852 results