© 2022 CyberNews - Latest tech news,
product reviews, and analyses.

If you purchase via links on our site, we may receive affiliate commissions.

Editorial

Climate change hits tech infrastructure

With data centers shutting down thanks to extreme temperatures, should we get used to outages?
Read more about Climate change hits tech infrastructure

Regulators are calling out greenwashing brands

From fast fashion brands, Boohoo and Asos to producers of bottled water and supermarkets like Asda, the legitimacy of green credentials and sustainability claims are being called out by regulators.
Read more about Regulators are calling out greenwashing brands

How a Florida teenager hacked NASA’s source code

At the tender age of 15, Jonathan James, from Pinecrest, Florida, managed to install a backdoor in US military servers and access the source code of the ISS.
Read more about How a Florida teenager hacked NASA’s source code

Big Tech: wolf in sheep’s clothing?

With Big Tech companies continuing to capitalize, their paramount monopolies have become the norm. Yet, a valid argument still stands – is Big Tech taking advantage of consumers by trading their data?
Read more about Big Tech: wolf in sheep’s clothing?

Why China’s move for algorithmic transparency could destroy big tech

A move in China towards algorithmic transparency could be disastrous for big tech.
Read more about Why China’s move for algorithmic transparency could destroy big tech

Fans have fallen in love with Apple Car, yet it doesn’t even exist

Once again, we find ourselves at the time of year when Apple predictably launched updated versions of the iPhone, Apple Watch, and AirPods.
Read more about Fans have fallen in love with Apple Car, yet it doesn’t even exist

Gamble or not: how loot boxes managed to survive a banning

Identified as risky and encouraging gambling, the loot box has managed to avoid being banned.
Read more about Gamble or not: how loot boxes managed to survive a banning

The existential threat of quantum computing – interview

Quantum computers will open doors to otherwise impossible breakthroughs. At the same time, they might render our security defenses useless.
Read more about The existential threat of quantum computing – interview

The metaverse – a new Wild West of privacy issues and criminal concerns

If security and privacy are hard to maintain on the internet, how will the metaverse fare?
Read more about The metaverse – a new Wild West of privacy issues and criminal concerns

Twitter whistleblower case prompts experts to call for tougher auditing of data-sensitive firms

In the wake of Peiter “Mudge” Zatko’s accusations against his former employer, a cybersecurity expert is calling for regulatory bodies to be given powers to inspect social media and other data-sensitive companies without prior notice.
Read more about Twitter whistleblower case prompts experts to call for tougher auditing of data-sensitive firms

Russia continues to see value in Wikipedia despite patchy efforts to replicate it

Free of the "LGBT lobby" and mentions of the war in Ukraine, Runiversalis is intended to be a Russian alternative to Wikipedia. It is off to a bumpy start, crashing shortly after launch.
Read more about Russia continues to see value in Wikipedia despite patchy efforts to replicate it

How the iPhone changed the world in 15 years

Fifteen years have passed since Steve Jobs declared that Apple had reinvented the phone. Yet, it's not until you revisit the game-changing keynote that you realize just how much those concepts changed our lives.
Read more about How the iPhone changed the world in 15 years

DDoS explained: biggest attack in history lasted 22 days

In the first half of 2022, the number of malicious DDoS attacks climbed 203% compared to the first six months of 2021. That's not a record worth celebrating.
Read more about DDoS explained: biggest attack in history lasted 22 days

Keen on starting a career in cybersecurity? Build a blue team lab

Building and excelling with a homegrown blue team lab to build defensive skillsets is a great and maybe less traveled path to cultivate a highly successful cybersecurity career.
Read more about Keen on starting a career in cybersecurity? Build a blue team lab

Baiting the scammers: meet the ex-FBI analyst who goes undercover to catch out the crooks

Online scammers may be perceived as devious masterminds that fool the unwary out of their money – but a former FBI analyst whose job is to play business email compromise (BEC) actors at their own game has found they can be surprisingly gullible themselves.
Read more about Baiting the scammers: meet the ex-FBI analyst who goes undercover to catch out the crooks

Malicious mind games: why cybercriminals fake ransomware attacks

Reports of cybercriminals' mischiefs are greatly exaggerated. Infamous gangs like Lapsus$ and LockBit have been caught red-handed for faking massive cyberattacks. What's in it for them?
Read more about Malicious mind games: why cybercriminals fake ransomware attacks

Ads are coming to your favorite streaming platforms

As people are massively canceling their streaming subscriptions, platforms are looking for alternative ways of making money.
Read more about Ads are coming to your favorite streaming platforms

Insurers don’t have your back: mounting losses reduce their interest in business

Even before the war in Ukraine, the cyber insurance industry was beginning to row back on supporting organizations that were attacked by state-sponsored groups.
Read more about Insurers don’t have your back: mounting losses reduce their interest in business