Showing 577 to 588 of 1,829 results


Taiwan Prepares Civilian Defense Strategy Using Convenience Stores Amidst China Threat
Faced with potential Chinese aggression, Taiwan is preparing a civilian defense strategy utilizing its extensive convenience store network for essential supply distribution and communication, alongside improved disaster relief centers, while addressing vulnerabilities in energy, communications, and ...
Taiwan Prepares Civilian Defense Strategy Using Convenience Stores Amidst China Threat
Faced with potential Chinese aggression, Taiwan is preparing a civilian defense strategy utilizing its extensive convenience store network for essential supply distribution and communication, alongside improved disaster relief centers, while addressing vulnerabilities in energy, communications, and ...
Progress
44% Bias Score


Microsoft Ends Windows 10 Support, Urges 750 Million Users to Upgrade
Microsoft will end Windows 10 support on October 14, 2024, prompting 750 million users to upgrade to Windows 11 to avoid critical security vulnerabilities like CVE-2025-29824, which is actively exploited globally; Microsoft offers a free upgrade for eligible hardware.
Microsoft Ends Windows 10 Support, Urges 750 Million Users to Upgrade
Microsoft will end Windows 10 support on October 14, 2024, prompting 750 million users to upgrade to Windows 11 to avoid critical security vulnerabilities like CVE-2025-29824, which is actively exploited globally; Microsoft offers a free upgrade for eligible hardware.
Progress
52% Bias Score


AI-Driven Job Scams Surge in the U.S., Posing a Major Cybersecurity Threat
AI-driven job scams are surging in the U.S., with Gartner predicting that by 2028, one in four global job candidates could be fraudulent, resulting in millions of dollars in financial losses for companies and data breaches. Scammers use AI to create convincing fake identities, bypassing traditional ...
AI-Driven Job Scams Surge in the U.S., Posing a Major Cybersecurity Threat
AI-driven job scams are surging in the U.S., with Gartner predicting that by 2028, one in four global job candidates could be fraudulent, resulting in millions of dollars in financial losses for companies and data breaches. Scammers use AI to create convincing fake identities, bypassing traditional ...
Progress
52% Bias Score


iOS Phishing Attacks Significantly Outpace Android in 2024
Lookout's 2024 report showed that 26% of iOS devices were targeted by phishing attacks, compared to 12% of Android devices, due to the Apple App Store's strong security measures that force attackers to use social engineering instead of malicious apps.
iOS Phishing Attacks Significantly Outpace Android in 2024
Lookout's 2024 report showed that 26% of iOS devices were targeted by phishing attacks, compared to 12% of Android devices, due to the Apple App Store's strong security measures that force attackers to use social engineering instead of malicious apps.
Progress
44% Bias Score


Combating Social Media Scams and Deepfakes: User Tools and Platform Responsibility
The increasing prevalence of scams, bots, and sophisticated deepfakes on social media demands both user vigilance (using tools like deepfake detectors and reverse image searches) and platform-level solutions (robust identity verification) to ensure trustworthy content and user safety.
Combating Social Media Scams and Deepfakes: User Tools and Platform Responsibility
The increasing prevalence of scams, bots, and sophisticated deepfakes on social media demands both user vigilance (using tools like deepfake detectors and reverse image searches) and platform-level solutions (robust identity verification) to ensure trustworthy content and user safety.
Progress
36% Bias Score


AI-Powered Phishing Attacks Demand Email System Redesign
AI-powered phishing attacks are becoming increasingly sophisticated, using large language models to personalize emails and bypass traditional security measures; Cofense reports a new "precision-validated phishing" technique that targets high-value individuals; this necessitates a fundamental rethink...
AI-Powered Phishing Attacks Demand Email System Redesign
AI-powered phishing attacks are becoming increasingly sophisticated, using large language models to personalize emails and bypass traditional security measures; Cofense reports a new "precision-validated phishing" technique that targets high-value individuals; this necessitates a fundamental rethink...
Progress
52% Bias Score

Cyberattack Exposes Security Gaps in Australian Superannuation
A coordinated credential-stuffing attack stole hundreds of thousands of dollars from Australian superannuation accounts, exposing weaknesses in security practices and highlighting the need for stronger multi-factor authentication and improved password hygiene among account holders.

Cyberattack Exposes Security Gaps in Australian Superannuation
A coordinated credential-stuffing attack stole hundreds of thousands of dollars from Australian superannuation accounts, exposing weaknesses in security practices and highlighting the need for stronger multi-factor authentication and improved password hygiene among account holders.
Progress
48% Bias Score

China Admits to Cyberattacks on U.S. Infrastructure
Chinese officials admitted responsibility for cyberattacks on U.S. infrastructure, including ports, airports, and utilities, during a December meeting, linking the attacks to U.S. support for Taiwan, as revealed by the Wall Street Journal.

China Admits to Cyberattacks on U.S. Infrastructure
Chinese officials admitted responsibility for cyberattacks on U.S. infrastructure, including ports, airports, and utilities, during a December meeting, linking the attacks to U.S. support for Taiwan, as revealed by the Wall Street Journal.
Progress
60% Bias Score

Cyberattack Leaks Sensitive Moroccan Data Amid Algeria Tensions
A cyberattack on Morocco's social security agency leaked sensitive personal data, including salary information and financial details of high-profile individuals, onto Telegram this week; hackers claimed responsibility in response to alleged online harassment of Algeria by Morocco, highlighting the d...

Cyberattack Leaks Sensitive Moroccan Data Amid Algeria Tensions
A cyberattack on Morocco's social security agency leaked sensitive personal data, including salary information and financial details of high-profile individuals, onto Telegram this week; hackers claimed responsibility in response to alleged online harassment of Algeria by Morocco, highlighting the d...
Progress
40% Bias Score

Phishing Leads Bank Card Fraud in Russia
VTB reports phishing as the leading method for bank card fraud in Russia, followed by social engineering and NFC cloning; attackers use fake online stores and impersonation tactics to steal financial data.

Phishing Leads Bank Card Fraud in Russia
VTB reports phishing as the leading method for bank card fraud in Russia, followed by social engineering and NFC cloning; attackers use fake online stores and impersonation tactics to steal financial data.
Progress
24% Bias Score

Russia's Undersea Cable Attacks Threaten Global Internet
Suspected Russian attacks on undersea cables carrying 95% of global internet traffic threaten worldwide internet blackouts and critical infrastructure; telecom giants urge immediate action from UK, EU, and NATO.

Russia's Undersea Cable Attacks Threaten Global Internet
Suspected Russian attacks on undersea cables carrying 95% of global internet traffic threaten worldwide internet blackouts and critical infrastructure; telecom giants urge immediate action from UK, EU, and NATO.
Progress
48% Bias Score

Tech Spending Surge: 99% of Companies to Increase Investments in 2025
A new study reveals 99% of companies will increase tech spending in 2025, with AI, cybersecurity, and data management as top priorities; however, procurement is shifting from IT to individual departments, and high performers prioritize agility and collaboration.

Tech Spending Surge: 99% of Companies to Increase Investments in 2025
A new study reveals 99% of companies will increase tech spending in 2025, with AI, cybersecurity, and data management as top priorities; however, procurement is shifting from IT to individual departments, and high performers prioritize agility and collaboration.
Progress
36% Bias Score
Showing 577 to 588 of 1,829 results