Showing 793 to 804 of 1,361 results


Failure of Canada's Cybersecurity Bill Exposes Critical Infrastructure to Attacks
Canada's cybersecurity bill, Bill C-26, which aimed to protect critical infrastructure, died due to the recent parliamentary prorogation, leaving businesses vulnerable to cyberattacks costing \$1.2 billion in 2023; experts urge proactive measures until the bill is reinstated.
Failure of Canada's Cybersecurity Bill Exposes Critical Infrastructure to Attacks
Canada's cybersecurity bill, Bill C-26, which aimed to protect critical infrastructure, died due to the recent parliamentary prorogation, leaving businesses vulnerable to cyberattacks costing \$1.2 billion in 2023; experts urge proactive measures until the bill is reinstated.
Progress
40% Bias Score


Windows 11 Improves Security with Just-in-Time Admin Privileges
Microsoft's Windows 11 Insider Preview Build 27774 introduces Administrator Protection, accessible via Windows Security settings, granting elevated privileges only when needed to enhance security by reducing the attack surface.
Windows 11 Improves Security with Just-in-Time Admin Privileges
Microsoft's Windows 11 Insider Preview Build 27774 introduces Administrator Protection, accessible via Windows Security settings, granting elevated privileges only when needed to enhance security by reducing the attack surface.
Progress
52% Bias Score


Ukraine Restores State Registers After Major Cyberattack
Following a large-scale cyberattack in December 2023 that temporarily disrupted Ukraine's state registers, the government announced on January 20th the full restoration of these systems, with no data loss reported; the head of National Information Systems was dismissed, and a new cybersecurity bill ...
Ukraine Restores State Registers After Major Cyberattack
Following a large-scale cyberattack in December 2023 that temporarily disrupted Ukraine's state registers, the government announced on January 20th the full restoration of these systems, with no data loss reported; the head of National Information Systems was dismissed, and a new cybersecurity bill ...
Progress
40% Bias Score


Amazon iPhone 16 Hack: Account Takeover via Social Engineering
A new hacking method targets Amazon customers, using fraudulent calls impersonating Amazon customer service to add multiple iPhone 16 orders to victims' accounts, tricking them into providing one-time codes for account takeover.
Amazon iPhone 16 Hack: Account Takeover via Social Engineering
A new hacking method targets Amazon customers, using fraudulent calls impersonating Amazon customer service to add multiple iPhone 16 orders to victims' accounts, tricking them into providing one-time codes for account takeover.
Progress
40% Bias Score


Sneaky 2FA Bypass Threatens Microsoft 365 Accounts
French security researchers exposed a new attack targeting Microsoft 365 accounts, bypassing 2FA and stealing credentials via a \$200/month phishing kit called Sneaky 2FA sold by Sneaky Log, impacting users across various platforms, highlighting the ongoing need for enhanced security measures and us...
Sneaky 2FA Bypass Threatens Microsoft 365 Accounts
French security researchers exposed a new attack targeting Microsoft 365 accounts, bypassing 2FA and stealing credentials via a \$200/month phishing kit called Sneaky 2FA sold by Sneaky Log, impacting users across various platforms, highlighting the ongoing need for enhanced security measures and us...
Progress
40% Bias Score


China Accuses US of Large-Scale Cyberattacks, Calls for Dialogue
A senior Chinese diplomat accuses the US of extensive cyberattacks against China's critical infrastructure, demanding Washington address Beijing's concerns and pursue a cyber relationship based on mutual respect and dialogue, highlighting the growing tensions in US-China relations.
China Accuses US of Large-Scale Cyberattacks, Calls for Dialogue
A senior Chinese diplomat accuses the US of extensive cyberattacks against China's critical infrastructure, demanding Washington address Beijing's concerns and pursue a cyber relationship based on mutual respect and dialogue, highlighting the growing tensions in US-China relations.
Progress
40% Bias Score

Ukraine's Ministry of Justice Suffers Month-Long Outage After Major Cyberattack
A sophisticated cyberattack in late December crippled Ukraine's Ministry of Justice's state registries for a month, highlighting vulnerabilities despite claims of robust security, and underscoring the need for improved cybersecurity practices.

Ukraine's Ministry of Justice Suffers Month-Long Outage After Major Cyberattack
A sophisticated cyberattack in late December crippled Ukraine's Ministry of Justice's state registries for a month, highlighting vulnerabilities despite claims of robust security, and underscoring the need for improved cybersecurity practices.
Progress
24% Bias Score

Rhineland-Palatinate Universities Strengthen Cybersecurity with €5 Million Investment
Rhineland-Palatinate's 12 universities are implementing a joint cybersecurity strategy funded with €5 million, establishing a service center and appointing cybersecurity officers at each university to improve IT security and response to cyberattacks, following a June 2023 attack on Kaiserslautern Un...

Rhineland-Palatinate Universities Strengthen Cybersecurity with €5 Million Investment
Rhineland-Palatinate's 12 universities are implementing a joint cybersecurity strategy funded with €5 million, establishing a service center and appointing cybersecurity officers at each university to improve IT security and response to cyberattacks, following a June 2023 attack on Kaiserslautern Un...
Progress
36% Bias Score

Surveillance Pricing: NSA and FTC Warn of Location-Based Price Discrimination
The NSA and FTC warn about "surveillance pricing," where companies use location and browsing data to charge different prices. Consumers can mitigate this by adjusting app permissions, deleting advertising IDs, and using privacy-centric browsers.

Surveillance Pricing: NSA and FTC Warn of Location-Based Price Discrimination
The NSA and FTC warn about "surveillance pricing," where companies use location and browsing data to charge different prices. Consumers can mitigate this by adjusting app permissions, deleting advertising IDs, and using privacy-centric browsers.
Progress
44% Bias Score

Corporatization of Cryptocurrency Crime Exceeds \$51 Billion in 2024
Chainalysis's 2024 report reveals that cryptocurrency crime, exceeding \$51 billion, has evolved into corporate-style criminal enterprises offering "crime-as-a-service", utilizing stablecoins (63% of volume), and employing sophisticated risk management strategies, presenting significant challenges f...

Corporatization of Cryptocurrency Crime Exceeds \$51 Billion in 2024
Chainalysis's 2024 report reveals that cryptocurrency crime, exceeding \$51 billion, has evolved into corporate-style criminal enterprises offering "crime-as-a-service", utilizing stablecoins (63% of volume), and employing sophisticated risk management strategies, presenting significant challenges f...
Progress
32% Bias Score

Growing Cybersecurity Threats Target Travelers in 2025
In 2025, travelers face heightened cybersecurity threats including sophisticated phishing scams, malicious websites, AI-generated fraud, and the exploitation of unsecured Wi-Fi networks, impacting booking, travel phases, and data security.

Growing Cybersecurity Threats Target Travelers in 2025
In 2025, travelers face heightened cybersecurity threats including sophisticated phishing scams, malicious websites, AI-generated fraud, and the exploitation of unsecured Wi-Fi networks, impacting booking, travel phases, and data security.
Progress
24% Bias Score

Hidden Malware in Emails Bypasses Security: 29,000 Victims
New malware campaigns, VIP Keylogger and 0bj3ctivityStealer, hide malicious code in email images, bypassing security; one image was viewed 29,000 times, resulting in credential and financial data theft.

Hidden Malware in Emails Bypasses Security: 29,000 Victims
New malware campaigns, VIP Keylogger and 0bj3ctivityStealer, hide malicious code in email images, bypassing security; one image was viewed 29,000 times, resulting in credential and financial data theft.
Progress
32% Bias Score
Showing 793 to 804 of 1,361 results