This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Dunham Ken Dunham , Cyber Threat Director, Qualys Threat Research Unit Nation-state attacks and cloud compromises with long dwell times are rising as security lags behind post-Covid digitaltransformation. While streamlining threat response, AIs rapid integration raises ethical concerns, especially in national security.
With the increasing reliance on digitaltechnologies for operational efficiency, this sector has become a prime target for sophisticated cyber and physical threats. Digitaltransformation: The integration of IoT, SCADA systems, and advanced analytics has increased operational efficiency but also expanded the attack surface.
The expanding threat landscape: vulnerabilities and attack types The aviation ecosystem is an intricate web of airlines, airports, air navigation service providers, maintenance suppliers, and third-party technology vendors. A cyberattack on any link, be it a ground-handling contractor or a software provider, can trigger cascading failures.
Governance pressure joining technology risk Capitol Hill is circulating a draft "Cyber Hygiene Safe Harbor" bill: firms demonstrating secure-by-design practices would gain liability shields after nation-state incidents. Fusion-team your threat hunting Volt Typhoon skips malware; it reuses built-in tools. Expand in later quarters.
I have a small site, Practical Technology , whose only job is to host copies of my stories. On the hardware behind the site, I also maintain my own NextCloud server, an email server, an off-site backup server, and multiple test Linux servers.
Together, these tech giants can introduce billions of global users to the phishing and smishing-resistant technology. In the passkey world, an authenticator is the technology that not only creates and stores the public and private key components of a passkey , but that also retrieves passkeys during any authentication ceremonies.
Adding to the urgency is the "convergence of advances in robotics, sensors, materials, artificial intelligence, propulsion and energy systems, and autonomous systems," which has drastically increased the capabilities and reduced the cost of advanced drone technologies for both legitimate and nefarious purposes. Dedicated Vessels: The U.K.,
" In April, an Android-based SMS message interception malware called Gorilla was discovered to be under development (evidence that threat actors have taken an interest in SMS). Just because the technology already exists doesn't mean we can just go use it. But passkeys have a chicken-and-egg problem.
PT FabrikaCr/Getty Images As generative AI has spread in recent years, so too have fears over the technology's misuse and abuse. Written by Webb Wright, Contributing Writer June 6, 2025 at 2:36 p.m. Tools like ChatGPT can produce realistic text, images, video, and speech.
Phishing, Malware, and the Rise of Resilient MFA Malicious actors continue to hone and improve their tactics. Unsurprisingly, malware and phishing continue to top the list of threat vectors, with ransomware close behind as a rapidly growing concern.
As organizations adopt new security tools such as CASB and container security, both of which generate valuable detection data, and as digitaltransformation introduces even more technology, security operations will only become more complex, exacerbating these issues. Tags (CVE, Actors, Malware, etc.)
To win buy-in from C-levels, communicate how the program aligns with company-wide priorities including compliance mandates and digitaltransformation. Set risk-based objectives Define outcome-driven goals depending on your people, processes and technology.
The stakes are higher than everprotecting critical infrastructure will require not just technology, but also robust incident response plans and partnerships.'" Broader Implementation of AI Acceptable Use Policies: Industries may begin focusing on formalizing guidelines to promote the ethical, secure, and responsible use of AI technologies.
And the technology is also being used in a growing number of use cases to empower threat actors to launch more sophisticated attacks at scale. We found that although most are already using AI tools for cyber, and many more plan to do so, a majority are also concerned about the impact the technology will have on their attack surface.
This so-called passwordless future is based on a new form of login credential known as the passkey, which itself is largely based on another technology -- public key cryptography -- that's been around for decades. I could have just as easily relied on a different website, operating system, browser, and authenticator.
Of course, as with any new technology, implementing MCP involves risks and safety best practices. ChatGPT Enterprise, Edu, and Team users can also publish the connector to their larger workspaces, where it can function as a knowledge source in Deep Research.
"Microsoft's privacy policy implies that user prompts may be shared with 'third parties that perform online advertising services for Microsoft or that use Microsoft's advertising technologies,'" Incogni said in the report.
The agent whiplash Reading Gartner's new report, one gets the sense that AI agents, which most people had never heard of just a year or two ago, are suddenly one of the technological cornerstones of the private sector. Want more stories about AI? Sign up for Innovation , our weekly newsletter.
The global-local AI balancing act Dr. David Bray has long advocated for people-centered approaches to technology, including his work with internet co-originator Vint Cerf and the People-Centered Internet coalition.
" Generative AI (Gen AI) tools, such as Copilot and ChatGPT , are automating tasks and changing the types of jobs available for technology professionals, Sahota added: "Why write bubble sorts or do code translation when Gen AI can do it more efficiently? "We will experience 100 years' worth of change in just 10 years."
Also: I found a worthy Ring alternative in this video security camera (and it has no subscriptions) "Today's advancements in AI represent something truly extraordinary -- perhaps it's safe to say this is the first technology that's impossible to overhype," said Jamie Siminoff, Ring founder, in an announcement.
PT Deagreez / Getty Images A new survey of enterprise use of artificial intelligence released Thursday by the Boston Consulting Group shows the technology has stalled in its deployment, and the most-hyped new area, "agents," has seen low adoption within companies so far.
Also: 8 ways to write better ChatGPT prompts - and get the results you want faster Several analogies are used to describe the impact of fast-evolving AI technologies , such as utilities, time-sharing systems, and operating systems. If so, they are changing the definition of what we consider to be software. and onto 3.0.
"Microsoft's privacy policy implies that user prompts may be shared with 'third parties that perform online advertising services for Microsoft or that use Microsoft's advertising technologies,'" Incogni said in the report.
The technology requires devices to have the necessary hardware to support it, and it appears that the time has arrived because we're seeing more devices, such as the Asus RT-B386U , supporting the standard. However, getting the most out of the device requires Wi-Fi extenders which can be an expensive endeavor.
PT Reviewed by Elyse Betters Picaro Bloomberg / Getty Images It doesn't matter if you are with a digital-native or a more traditional organization -- artificial intelligence is going to upend your ways of working or doing business. Written by Joe McKendrick, Contributing Writer June 27, 2025 at 6:05 a.m.
The migration to Linux and open-source technology will happen in phases. Now, with the EU's growing distrust of the US and its technology companies, we can expect to see more such moves. For the latter, it appears Schrödter was referring to the migration from Windows 10 to 11.
This is powered by AI technology within the HomeBase 3 that allows users to name the faces the camera detects, letting you know when "Maria" is detected at the front door instead of just "a person." Add the HomeBase 3 and the E340 dual doorbell, which can also confidently identify who's at the door by name.
PT shomos uddin/Getty Images Welcome to the age of hybrid work, where businesses will augment the human workforce with AI agents -- the birth of the autonomous enterprise, according to research from technology specialist MuleSoft. Written by Vala Afshar, Contributing Writer June 16, 2025 at 2:40 a.m.
The technology requires devices to have the necessary hardware to support it, and it appears that the time has arrived because we're seeing more devices, such as the Asus RT-B386U , supporting the standard. Wi-Fi 7 has been around since last January, but widespread adoption has been limited. Online security is another large aspect.
He added that the wearable health technology is a key pillar to the "Making America Healthy Again" agenda. Also: 4 health trackers I'd recommend to anyone (and why they make such a big difference) "My vision is that every American is wearing a wearable within four years," Kennedy said.
One recent report in MIT Technology Review concluded, "These are big-time lawyers making significant, embarrassing mistakes with AI. [S]uch How many relevant cases did that AI assistant miss? And there are plenty of other examples of lawyers citing fictitious cases in official court filings.
Also: The 7 best AI features announced at Apple's WWDC that I can't wait to use The news marks Meta's latest effort to stay ahead in the ongoing AI race , which has engulfed much of the tech world since the launch of ChatGPT in 2022 revealed the technology's capabilities to a mainstream audience.
Disclosure: Ziff Davis, ZDNET's parent company, filed an April 2025 lawsuit against OpenAI, alleging it infringed Ziff Davis copyrights in training and operating its AI systems.)
Even under the Biden administration, which took some steps to regulate AI, states were already introducing AI legislation as the technology evolved rapidly into the unknown. In the meantime, the country is effectively flying blind, which has prompted several states to introduce their own AI bills.
Microsoft, in turn, got the rights to integrate OpenAI's technology into its core products, including its Bing search engine, which was later rebranded to Microsoft Copilot.
It's built upon Meta's Private Processing technology, which means the summaries are conveyed privately to users without any of the information being shared with Meta or WhatsApp. Message Summaries leverages Meta AI to provide brief, bulleted lists outlining key points from a message chain on the social messaging app.
Transit on Wear OS I commute to work on a train using our local Puget Sound ORCA transit card, and despite Seattle being a technology hub, ORCA is not supported by Apple Pay. If you message me, stay tuned for some interesting new emojis.
In both devices, Cisco is incorporating the wireless broadband technology known as "Ultra-Reliable Wireless Backhaul," which is meant as a substitute for fiber-optics. Cisco emphasizes being able to combine URWB, as it's known, with Wi-Fi in the same devices.
But after trying TCL's Nxtpaper technology last year, I haven't looked back. TCL's Nxtpaper technology isn't the same as E Ink, which uses electrophoretic technology to create a monochromatic image. Also: Your iPad is getting a major upgrade for free.
The announcement follows a dire warning from the company's CEO, Dario Amodei, that the technology could eliminate half of all white-collar jobs within the next five years.
The technology has become a central fixation for the ad industry since the public debut of generative AI tools, which began in earnest with the 2022 release of ChatGPT. A new era for marketers Reddit's announcement was just a drop in the AI bucket at Cannes Lions this year.
Also: 7 trends shaping digitaltransformation in 2025 - and AI looms large Good taste comes from how an "artist" sees the world -- their unique mix of wins, losses, and lessons learned. Good taste will go at a premium AI tools have made it incredibly easy for anyone to create content. That's where the magic happens.
Additionally, the display features some crazy-good anti-glare technology with impressive light mitigation. Samsung seems to have optimized the technology on the Edge, as I didn't have any notable issues with its responsiveness this time around.
We organize all of the trending information in your field so you don't have to. Join 28,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content