The U.S. government is moving quickly and aggressively to address cybersecurity vulnerabilities affecting both the federal government and the private sector. Information technology companies that are directly and indirectly involved in providing IT products and services to the federal government will be especially affected by the "Executive Order on Improving the Nation's Cybersecurity.
The technology one-upmanship between the United States and China is fast becoming the new space race. There's been a lot of talk in the press about the competition to reach 5G, but little traction outside of the tech community about something more momentous: the dangers of computing in a post-quantu...
The Russian hacking group known for stealing sensitive emails from the Democratic National Committee during the 2016 presidential election season has been cracking into printers, phones and video decoders to gain access to corporate networks, according to Microsoft. The group, known by a number of n...
President Donald Trump has signed an executive order aimed at boosting artificial intelligence R&D in the U.S. The order sets up the American AI Initiative, which instructs federal agencies to move projects involving artificial intelligence to the top of their priority lists. No funding is propo...
Widespread use of unpatched open source code in the most popular Android apps distributed by Google Play has caused significant security vulnerabilities, suggests an American Consumer Institute report. Thirty-two percent -- or 105 apps out of 330 of the most popular apps in 16 categories sampled -- ...
Ransomware has become a gold mine for digital criminals. In the first three months of this year, electronic extortionists squeezed $209 million from victims desperate to recover their data after it was scrambled by the malicious software, based on FBI estimates. At that rate, ransomware could funnel...
Google last week announced an experiment with post-quantum cryptography in Chrome. A small fraction of connections between Google's servers and Chrome on the desktop will use a post-quantum key-exchange algorithm in addition to the elliptic-curve key-exchange algorithm already being used. The idea i...
Apple last week filed a motion to vacate a federal order requiring the company to create a tool or code to unlock the iPhone of one of the San Bernardino, California, shooters. The order would set a dangerous precedent and release a powerful means to breach security on potentially millions of phones...
Zerodium has posted a million-dollar bounty for juicy iOS 9 bugs or jailbreaks. Zerodium runs a market where exploits and vulnerabilities are bought and sold, according to Damballa. "While there is no insight into a specific buyer, we can assume if an exploit for iOS 9 is found, Zerodium will sell...
Consumers are beginning to lose their patience with the custodians of their personal information. Survey results from 2,000 consumers released last week by HyTrust, suggest that 51 percent of those polled would bolt from any business involved in a data breach that compromised personal information su...
Another digital currency was brought to its knees last week when the administrators of Doge Vault had to suspend operations after they discovered their online wallet service had been attacked by hackers. Following an investigation of the incident and the reconstruction of some of their damaged infor...
The National Institute of Standards and Technology on Wednesday released a preliminary cybersecurity framework for improving the cybersecurity of the United States' critical infrastructure. The Institute will soon open a 45-day public comment period on the framework, seeking input from reviewers on ...
RSA has advised its customers to make a configuration adjustment to its BSafe security software products. This follows an announcement issued by NIST not to use a security standard it designed and published: the Dual Elliptic Curve Deterministic Random Bit Generator. The Dual_EC_DRBG is believed to ...
Just when we thought the spam scourge was over, it appears it's making a comeback. After four straight quarters of decline, spam volumes on the Internet rose 92 percent in February, according to security firm Eleven Research Team. Nasty forms of spam also showed significant increases. Phishing email...
Too much regulation, not enough protection, too much private sector involvement: President Obama's just-released cybersecurity executive order has sparked concern from several advocacy groups, even as controversial legislation designed to protect the nation's infrastructure made a reappearance Wedne...
Recycle via a manufacturer or retailer program
Use a local e-waste recycling service
Sell or trade in for cash or credit
Donate or give away
Discard in trash
https://www.technewsworld.com/wp-content/uploads/sites/3/2023/10/Microsoft-Copilot.jpg
https://www.technewsworld.com/story/microsofts-copilot-rises-from-the-ashes-of-bob-and-clippy-178799.html
Microsoft’s Copilot Rises From the Ashes of Bob and Clippy
https://www.technewsworld.com/wp-content/uploads/sites/3/2023/10/AnkerWork-C300-Webcam.jpg
https://www.technewsworld.com/story/ankerwork-powerconf-c300-webcam-delivers-ai-powered-excellence-in-a-compact-design-178737.html
AnkerWork PowerConf C300 Webcam Delivers AI-Powered Excellence in a Compact Design
https://www.technewsworld.com/wp-content/uploads/sites/3/2023/11/computer-shopping.jpg
https://www.technewsworld.com/story/its-about-to-become-much-harder-to-choose-the-right-pc-178759.html
It’s About To Become Much Harder To Choose the Right PC
https://www.technewsworld.com/wp-content/uploads/sites/3/2023/11/tv-set-top-box-with-remote.jpg
https://www.technewsworld.com/story/electronic-frontier-foundation-calls-for-ftc-action-on-poisoned-set-top-boxes-178797.html
Electronic Frontier Foundation Calls for FTC Action on Poisoned Set-Top Boxes
https://www.technewsworld.com/wp-content/uploads/sites/3/2022/02/cyberwarfare-1.jpg
https://www.technewsworld.com/story/casino-breaches-expose-why-identity-management-is-at-a-crossroads-178758.html
Casino Breaches Expose Why Identity Management Is at a Crossroads
https://www.technewsworld.com/wp-content/uploads/sites/3/2023/09/passwordless-computing.jpg
https://www.technewsworld.com/story/the-realities-of-switching-to-a-passwordless-computing-future-178579.html
The Realities of Switching to a Passwordless Computing Future
https://www.technewsworld.com/wp-content/uploads/sites/3/2023/10/modern-car-interior.jpg
https://www.technewsworld.com/story/wind-river-linux-drives-new-solutions-for-software-defined-vehicles-177190.html
Wind River Linux Drives New Solutions for Software-Defined Vehicles
https://www.technewsworld.com/wp-content/uploads/sites/3/2023/11/Bing-Google.jpg
https://www.technewsworld.com/story/ai-fails-to-move-needle-for-bings-share-of-search-market-178783.html
AI Fails To Move Needle for Bing’s Share of Search Market
https://www.technewsworld.com/wp-content/uploads/sites/3/2023/09/network-engineers-code.jpg
https://www.technewsworld.com/story/more-linux-malware-means-more-linux-monitoring-177174.html
More Linux Malware Means More Linux Monitoring
https://www.technewsworld.com/wp-content/uploads/sites/3/2023/10/Meta-Quest-3.jpg
https://www.technewsworld.com/story/impressions-of-meta-quest-3-the-must-have-vr-gift-for-the-holidays-178705.html
Impressions of Meta Quest 3: The Must-Have VR Gift for the Holidays?
https://www.technewsworld.com/wp-content/uploads/sites/3/2023/10/police-call-center.jpg
https://www.technewsworld.com/story/hacker-advocates-turning-tracking-tables-on-law-enforcement-178695.html
Hacker Advocates Turning Tracking Tables on Law Enforcement
https://www.technewsworld.com/wp-content/uploads/sites/3/2023/11/computer-chip.jpg
https://www.technewsworld.com/story/chip-wars-of-2024-will-a-cell-phone-take-the-laptop-crown-178760.html
Chip Wars of 2024: Will a Cell Phone Take the Laptop Crown?
https://www.technewsworld.com/wp-content/uploads/sites/3/2023/11/Gunnar-Tallac-blue-light-flitering-glasses.jpg
https://www.technewsworld.com/story/gunnar-tallac-glasses-a-stylish-solution-for-blue-light-protection-178787.html
Gunnar Tallac Glasses: A Stylish Solution for Blue-Light Protection
https://www.technewsworld.com/wp-content/uploads/sites/3/2023/10/Noorio-B310-security-camera.jpg
https://www.technewsworld.com/story/noorio-b310-ai-powered-camera-spotlights-better-outdoor-security-178699.html
Noorio B310 AI-Powered Camera Spotlights Better Outdoor Security
https://www.technewsworld.com/wp-content/uploads/sites/3/2023/01/smart-home-2-story.jpg
https://www.technewsworld.com/story/leverage-the-power-of-data-to-monitor-home-energy-efficiency-178147.html
Leverage the Power of Data To Monitor Home Energy Efficiency
https://www.technewsworld.com/wp-content/uploads/sites/3/2022/02/industrial-robots.jpg
https://www.technewsworld.com/story/how-low-code-no-code-platforms-can-help-manufacturers-embrace-iot-178517.html
How Low-Code/No-Code Platforms Can Help Manufacturers Embrace IoT
https://www.technewsworld.com/wp-content/uploads/sites/3/2022/08/security-team.jpg
https://www.technewsworld.com/story/it-and-security-leaders-baffled-by-ai-unsure-about-security-risks-study-178716.html
IT and Security Leaders Baffled by AI, Unsure About Security Risks: Study
https://www.technewsworld.com/wp-content/uploads/sites/3/2022/07/decision-maker.jpg
https://www.technewsworld.com/story/cyber-insurance-costs-rising-coverages-shrinking-report-178569.html
Cyber Insurance Costs Rising, Coverages Shrinking: Report
https://www.technewsworld.com/wp-content/uploads/sites/3/2023/10/TikTok.jpg
https://www.technewsworld.com/story/gen-z-millennials-turning-to-tiktok-for-career-advice-178731.html
Gen Z, Millennials Turning to TikTok for Career Advice
https://www.technewsworld.com/wp-content/uploads/sites/3/2023/10/open-source-vulnerability.jpg
https://www.technewsworld.com/story/qualys-discovers-critical-linux-flaw-looney-tunables-177181.html
Qualys Discovers Critical Linux Flaw ‘Looney Tunables’
https://www.technewsworld.com/wp-content/uploads/sites/3/2023/11/law-enforcement-investigators.jpg
https://www.technewsworld.com/story/tech-coalition-launches-initiative-to-crackdown-on-nomadic-child-predators-178773.html
Tech Coalition Launches Initiative To Crackdown on Nomadic Child Predators
https://www.technewsworld.com/wp-content/uploads/sites/3/2023/09/AnkerWork-B600-Video-Bar-meeting.jpg
https://www.technewsworld.com/story/ankerwork-b600-video-bar-lights-up-a-better-conferencing-experience-178647.html
AnkerWork B600 Video Bar Lights Up a Better Conferencing Experience
https://www.technewsworld.com/wp-content/uploads/sites/3/2023/10/medical-staff.jpg
https://www.technewsworld.com/story/diagnosus-app-uses-gamification-to-fill-gaps-in-medical-education-178676.html
DiagnosUs App Uses Gamification To Fill Gaps in Medical Education
https://www.technewsworld.com/wp-content/uploads/sites/3/2023/03/Bard-wait-list.jpg
https://www.technewsworld.com/story/google-invites-public-to-test-drive-its-ai-chatbot-bard-178066.html
Google Invites Public To Test Drive Its AI Chatbot Bard
https://www.technewsworld.com/wp-content/uploads/sites/3/2023/08/e-waste.jpg
https://www.technewsworld.com/story/disorganization-not-cost-fuels-the-it-e-waste-crisis-178570.html
Disorganization, Not Cost, Fuels the IT E-Waste Crisis
https://www.technewsworld.com/wp-content/uploads/sites/3/2022/02/qualcomm-sign.jpg
https://www.technewsworld.com/story/qualcomm-takes-aim-at-redefining-mobile-and-pc-technology-178743.html
Qualcomm Takes Aim at Redefining Mobile and PC Technology
https://www.technewsworld.com/wp-content/uploads/sites/3/2023/07/X.jpg
https://www.technewsworld.com/story/musk-rolls-dice-with-drastic-rebranding-of-twitter-178485.html
Musk Rolls Dice With Drastic Rebranding of Twitter
https://www.technewsworld.com/wp-content/uploads/sites/3/2023/09/AST-SpaceMobile-Satellite-Call.jpg
https://www.technewsworld.com/story/satco-makes-first-5g-call-via-satellite-using-everyday-smartphone-178637.html
SatCo Makes First 5G Call via Satellite Using Everyday Smartphone
https://www.technewsworld.com/wp-content/uploads/sites/3/2023/08/edtech-student.jpg
https://www.technewsworld.com/story/modern-edtech-goes-beyond-coding-to-career-preparedness-178511.html
Modern EdTech Goes Beyond Coding to Career Preparedness
https://www.technewsworld.com/wp-content/uploads/sites/3/2023/06/Apple-Vision-Pro-at-home.jpg
https://www.technewsworld.com/story/one-more-thing-apple-unveils-vision-pro-mixed-reality-headset-at-wwdc23-178380.html
One More Thing…Apple Unveils Vision Pro Mixed-Reality Headset at WWDC23
https://www.technewsworld.com/wp-content/uploads/sites/3/2023/11/Grok.jpg
https://www.technewsworld.com/story/ai-with-attitude-musk-venture-raises-curtain-on-chatgpt-competitor-grok-178771.html
AI With Attitude: Musk Venture Raises Curtain on ChatGPT Competitor ‘Grok’
https://www.technewsworld.com/wp-content/uploads/sites/3/2023/07/legal-scales-of-justice.jpg
https://www.technewsworld.com/story/the-problem-with-suing-gen-ai-companies-for-copyright-infringement-178470.html
The Problem With Suing Gen AI Companies for Copyright Infringement
https://www.technewsworld.com/wp-content/uploads/sites/3/2022/07/evs-charging.jpg
https://www.technewsworld.com/story/study-finds-ev-battery-replacement-rare-most-covered-by-warranty-178257.html
Study Finds EV Battery Replacement Rare, Most Covered by Warranty
https://www.technewsworld.com/wp-content/uploads/sites/3/2023/07/Goovis-G3-Max.jpg
https://www.technewsworld.com/story/apple-vision-pro-and-why-the-goovis-g3-max-may-be-better-178495.html
Apple Vision Pro and Why the Goovis G3 Max May Be Better
https://www.technewsworld.com/wp-content/uploads/sites/3/2023/09/Apple-Watch-S9.jpg
https://www.technewsworld.com/story/apple-sets-the-bar-for-virtual-launch-events-178629.html
Apple Sets the Bar for Virtual Launch Events
https://www.technewsworld.com/wp-content/uploads/sites/3/2023/06/women-dont-play-emma-raz.jpg
https://www.technewsworld.com/story/women-dont-play-confronts-gender-disparity-in-the-tech-industry-178379.html
‘Women Don’t Play’ Confronts Gender Disparity in the Tech Industry
Enter your Username and Password to sign in.