Showing 1,117 to 1,128 of 2,462 results


Leeds Attack: Counter-Terror Police Investigate "Massacre" Plot
In Leeds, a man, 38, critically injured himself after an attack injuring two women; a crossbow and firearm were recovered, and counter-terrorism police investigate Facebook posts mentioning a "massacre" plan.
Leeds Attack: Counter-Terror Police Investigate "Massacre" Plot
In Leeds, a man, 38, critically injured himself after an attack injuring two women; a crossbow and firearm were recovered, and counter-terrorism police investigate Facebook posts mentioning a "massacre" plan.
Progress
44% Bias Score


Typosquatting: Risks and Prevention
Typosquatting involves registering domain names that closely resemble legitimate websites to deceive users into visiting malicious sites, potentially leading to malware infections, data theft, and financial fraud.
Typosquatting: Risks and Prevention
Typosquatting involves registering domain names that closely resemble legitimate websites to deceive users into visiting malicious sites, potentially leading to malware infections, data theft, and financial fraud.
Progress
12% Bias Score


Ethical Hacking: Skills, Qualifications, and Earning Potential
Ethical hackers, earning an average of $122,000 annually in the U.S., identify and fix computer system vulnerabilities, requiring skills in coding, problem-solving, and communication, often attained through degrees in computer science and certifications like CEH.
Ethical Hacking: Skills, Qualifications, and Earning Potential
Ethical hackers, earning an average of $122,000 annually in the U.S., identify and fix computer system vulnerabilities, requiring skills in coding, problem-solving, and communication, often attained through degrees in computer science and certifications like CEH.
Progress
40% Bias Score


FBI Arrests 22 in Nigeria-Based Sextortion Ring Linked to Teen Suicides
The FBI, in collaboration with the EFCC, arrested 22 Nigerian cybercriminals involved in a sextortion scheme targeting US minors, resulting in at least 10 suicides; the operation, called "Operation Artemis," highlights a 30% rise in sextortion-related tips between October 2024 and March 2025.
FBI Arrests 22 in Nigeria-Based Sextortion Ring Linked to Teen Suicides
The FBI, in collaboration with the EFCC, arrested 22 Nigerian cybercriminals involved in a sextortion scheme targeting US minors, resulting in at least 10 suicides; the operation, called "Operation Artemis," highlights a 30% rise in sextortion-related tips between October 2024 and March 2025.
Progress
48% Bias Score


Google's Encrypted Gmail: Security Risks Outweigh Benefits
Google's new end-to-end encrypted Gmail feature, while seemingly enhancing security, creates vulnerabilities by requiring users to access encrypted emails via a restricted Gmail version, increasing the risk of phishing attacks impacting its 3 billion users.
Google's Encrypted Gmail: Security Risks Outweigh Benefits
Google's new end-to-end encrypted Gmail feature, while seemingly enhancing security, creates vulnerabilities by requiring users to access encrypted emails via a restricted Gmail version, increasing the risk of phishing attacks impacting its 3 billion users.
Progress
60% Bias Score


Pentagon Security Concerns Raised by Hegseth's Use of Unsecured "Dirty Line" for Signal App
Defense Secretary Pete Hegseth used a personal computer connected to an unsecured commercial internet line, or "dirty line," in his Pentagon office to access the Signal app, raising security concerns due to the lack of firewall protections; a DOD spokesperson confirmed Hegseth never used Signal on h...
Pentagon Security Concerns Raised by Hegseth's Use of Unsecured "Dirty Line" for Signal App
Defense Secretary Pete Hegseth used a personal computer connected to an unsecured commercial internet line, or "dirty line," in his Pentagon office to access the Signal app, raising security concerns due to the lack of firewall protections; a DOD spokesperson confirmed Hegseth never used Signal on h...
Progress
52% Bias Score

Rise in Fraudulent Driver's Licenses and Identity Cards in the Netherlands
The Netherlands is experiencing a rise in fraudulent driver's licenses and identity cards, exceeding passport fraud, due to increased daily use and ease of forgery; authorities are improving detection but face challenges due to the diverse nature of perpetrators.

Rise in Fraudulent Driver's Licenses and Identity Cards in the Netherlands
The Netherlands is experiencing a rise in fraudulent driver's licenses and identity cards, exceeding passport fraud, due to increased daily use and ease of forgery; authorities are improving detection but face challenges due to the diverse nature of perpetrators.
Progress
32% Bias Score

Gmail's End-to-End Encryption: Enhanced Security Creates New Phishing Risks
Google's new end-to-end encryption for Gmail, while improving security for Gmail users, creates a new vulnerability for non-Gmail users who receive encrypted emails via a restricted Gmail interface, increasing the risk of phishing attacks mimicking legitimate invitations.

Gmail's End-to-End Encryption: Enhanced Security Creates New Phishing Risks
Google's new end-to-end encryption for Gmail, while improving security for Gmail users, creates a new vulnerability for non-Gmail users who receive encrypted emails via a restricted Gmail interface, increasing the risk of phishing attacks mimicking legitimate invitations.
Progress
48% Bias Score

AI-Powered Phishing Attack Bypasses Microsoft 365 MFA
A new phishing attack, "SessionShark O365 2FA/MFA," bypasses Microsoft Office 365's multi-factor authentication by stealing user session tokens; this attack uses AI to create realistic phishing pages and is being sold as an educational tool, highlighting the need for stronger authentication methods ...

AI-Powered Phishing Attack Bypasses Microsoft 365 MFA
A new phishing attack, "SessionShark O365 2FA/MFA," bypasses Microsoft Office 365's multi-factor authentication by stealing user session tokens; this attack uses AI to create realistic phishing pages and is being sold as an educational tool, highlighting the need for stronger authentication methods ...
Progress
40% Bias Score

Three-Word Passwords Cracked: Research Exposes Security Flaw
New research reveals that up to 77.5% of passwords created using the recommended three-random-word method are vulnerable to cracking using optimized techniques, challenging existing password security advice and highlighting vulnerabilities for users and law enforcement alike.

Three-Word Passwords Cracked: Research Exposes Security Flaw
New research reveals that up to 77.5% of passwords created using the recommended three-random-word method are vulnerable to cracking using optimized techniques, challenging existing password security advice and highlighting vulnerabilities for users and law enforcement alike.
Progress
52% Bias Score

Apple Removes Deepfake Apps After TikTok Advertising Scandal
Four apps offering to digitally remove clothing from photos were removed from Apple's AppStore after a BBC investigation revealed they were advertised on TikTok as tools to create non-consensual deepfakes; one app was downloaded over 1 million times on Google Play, and TikTok removed the ads but sim...

Apple Removes Deepfake Apps After TikTok Advertising Scandal
Four apps offering to digitally remove clothing from photos were removed from Apple's AppStore after a BBC investigation revealed they were advertised on TikTok as tools to create non-consensual deepfakes; one app was downloaded over 1 million times on Google Play, and TikTok removed the ads but sim...
Progress
60% Bias Score

Pentagon Security Breach: Hegseth Used Unsecured Line for Signal
US Defense Secretary Pete Hegseth installed an unsecured internet connection in his office to use the encrypted messaging app Signal on his personal computer, bypassing Pentagon security protocols and potentially exposing sensitive information, according to anonymous sources at AP and ABC News.

Pentagon Security Breach: Hegseth Used Unsecured Line for Signal
US Defense Secretary Pete Hegseth installed an unsecured internet connection in his office to use the encrypted messaging app Signal on his personal computer, bypassing Pentagon security protocols and potentially exposing sensitive information, according to anonymous sources at AP and ABC News.
Progress
48% Bias Score
Showing 1,117 to 1,128 of 2,462 results