#security

[ follow ]
fromwww.independent.co.uk
5 hours ago

Jewish community feared attack like Manchester amid rise in antisemitic incidents

Members of the Jewish community say they have been living in fear of a major attack for almost two years. Synagogues, schools and other Jewish sites across the country have ramped up security as they faced a surge in antisemitic incidents in the wake of the war in Gaza. On Thursday, almost two years after Hamas launched its 7 October 2023 attacks, their fears became a reality when a knifeman wearing suspected suicide vest targeted worshippers outside a Manchester synagogue.
UK news
Information security
fromComputerworld
22 hours ago

Microsoft urged to change deadline for end of Windows 10 support

Windows 11 upgrades risk breaking legacy-connected devices, create electronic waste, impose consumer costs, and cause security and public-sector budget strains.
#nodejs
fromnodesource.com
1 day ago
Node JS

15 Recent Node.js Features that Replace Popular npm Packages

Modern Node.js now includes many features previously provided by popular npm packages, reducing dependencies and improving security and maintainability.
fromGameSpot
1 day ago

New PS5 Update Is Out Now, Tightens Up System Security

A new firmware update--Version: 25.06-12.02.00--for the PlayStation 5 console has gone live, and unsurprisingly, it doesn't do much. What this new update does is improve the security on your device, but don't expect to see any new major features added to your PS5 once it has been installed. "We've made some security fixes to the system software," reads the very succinct update notes.
Video games
fromTryton Discussion
1 day ago

Newsletter October 2025

Please update your systems to take care of a security related bug we found last month. Luis Falcon has found that trytond may log sensitive data like passwords when the logging level is set to INFO. ImpactCVSS v3.0 Base Score: 4.2 Attack Vector: Network Attack Complexity: Low Privileges Required: High User Interaction: None Scope: Unchanged Confidentiality: High Integrity: None Availability: None Workaround Increasing the logging level above INFO prevents logging of the sensitive data.
Software development
Software development
fromInfoQ
1 day ago

Cursor 1.7 Adds Hooks for Agent Lifecycle Control

Cursor 1.7 adds Hooks that let external scripts intercept and modify agent lifecycle events to enforce guardrails, redact data, automate workflows, and run formatters.
Europe politics
fromwww.theguardian.com
1 day ago

The European Union was designed for peace it is never going to be a war machine | Anand Menon

The European Union strengthens peace through integration but lacks effectiveness as a defence organisation and cannot substitute for robust military capabilities.
Apple
fromMail Online
2 days ago

Update your iPhone NOW: Apple releases iOS 26.0.01 with security fixes

iOS 26.0.1 fixes Wi‑Fi/Bluetooth and cellular connectivity issues, corrects photo artifacts, blank app icons and VoiceOver disablement, and includes security and other bug fixes.
UX design
fromMedium
1 week ago

Vibe code straight from your website

Vibe coding on live websites speeds iteration and yields accurate, testable prototypes but can produce messy code, security risks, and poor scalability for complex systems.
DevOps
fromInfoQ
4 days ago

Imagine Learning Highlights Linkerd's Role in Cloud-Native Scale and Cost Savings

Linkerd provides a simple, high-performance service mesh that improves reliability, scalability, security, and reduces compute, operational overhead, CVEs, and network costs.
#ryder-cup
Remodel
fromwww.theguardian.com
6 days ago

No room for your bike? Here are 13 clever, space-saving storage ideas for indoors and out

Secure, space-efficient bike storage options include Sold Secure-rated outdoor solutions, insulated or police-approved sheds, indoor mounts, and lockable multi-bike units.
UX design
fromMedium
1 week ago

7 Things Your Embedded Analytics Strategy Needs to Address

Embedded analytics must be planned strategically, integrating secure, governed data and seamless UX to drive engagement, reduce churn, and deliver contextual value.
Software development
fromInfoWorld
1 week ago

The best new features in Postgres 18

Postgres 18 centralizes credential management, enables scalable role-based access control, deprecates MD5 in favor of SCRAM, enhances SQL standards support, and improves query optimization.
Tech industry
fromZDNET
1 week ago

Consumer Reports slams Microsoft for Windows 10 mess, urges extension of free updates

Ending free Windows 10 support will strand millions of PCs, force paid extensions or costly upgrades, increase e-waste, and raise security and national-security concerns.
fromwww.mediaite.com
1 week ago

JUST IN: Armed Man Posing as Law Enforcement Arrested at Arizona Site of Charlie Kirk Memorial Service

Local law enforcement, along with the Secret Service, approached someone they said looked suspicious. And at that time, he told them that he was a member of law enforcement. He was armed. They continued to interview him, determined that he was not a member of law enforcement. He was taken into custody and remains in custody right now, Gray said.
US politics
Miscellaneous
fromIrish Independent
1 week ago

Gardai arrest individual found with suspected detonators at Dublin Airport amid major security alert

Terminal 2 at Dublin Airport was evacuated after suspected detonator and devices were found, triggering a security response and flight disruption during Europe-wide cyber incidents.
UK politics
fromwww.theguardian.com
1 week ago

Parliament vulnerable to foreign actors' after China spying charges dropped, Commons speaker says

Dropping charges against two suspected China spies left the UK Parliament vulnerable to foreign interference, prompting calls to strengthen security and pursue further protective measures.
Artificial intelligence
fromTechCrunch
2 weeks ago

Google brings Gemini in Chrome to US users, unveils agentic browsing capabilities, and more | TechCrunch

Gemini in Chrome is now available to all U.S. Mac and Windows desktop users in English, adding multi-tab, web-retrieval, app integrations, and upcoming agentic features.
World news
fromwww.aljazeera.com
2 weeks ago

Indonesia's Subianto appoints new security minister after deadly protests

President Prabowo Subianto appointed retired general Djamari Chaniago as coordinating minister for politics and security following deadly economic protests that prompted cabinet changes.
fromSecuritymagazine
2 weeks ago

Reading, Heeding, and Leading

This column has previously cited or recommended books on security, risk and leadership. Having just submitted a book manuscript to a publisher that explores the confluence of those three topics, I discovered that I drew most inspiration for my approach and analysis from works that don't directly relate to any of these subjects. (I should note that I tapped this column for content that I updated or more fully developed in the book).
Books
Miscellaneous
fromwww.npr.org
2 weeks ago

A look at the pomp and pageantry that will define Trump's U.K. summit

President Trump will receive full royal pomp at Windsor Castle, including a carriage procession enabled by greater security and differing from his previous state visit.
US politics
fromAxios
2 weeks ago

Scoop: Congressman wants to use drones to stop assassinations after Charlie Kirk shooting

Legislation proposes a DHS study on deploying drones to scan elevated structures and detect assassination attempts, expanding protections beyond Secret Service protectees.
#elon-musk
#donald-trump
Miscellaneous
fromwww.dw.com
3 weeks ago

Poland united and determined after Russian drone incursion DW 09/11/2025

Polish leaders Nawrocki and Tusk set aside partisan differences to coordinate a unified response after 19 Russian drones, many from Belarus, breached Polish airspace.
US news
fromBoston.com
3 weeks ago

U.S. marks 24th anniversary of 9/11 terror attacks

Americans observed the 24th anniversary of 9/11 with solemn memorials, family remembrances, readings of names, and heightened security after recent political violence.
fromESPN.com
3 weeks ago

'His mission is to be the best quarterback': Why fame hasn't changed Jayden Daniels

As Washington Commanders quarterback Jayden Daniels made his way through the concourse of Capital One Arena following a Washington Capitals game in late April, he was forced to begrudgingly reach a conclusion about his status in the nation's capital that many had known for months: He was a big deal. On this day, the simple act of walking to the bathroom required the help of four to five security guards. There, a handful of fans tried to snap selfies with him.
Washington DC
fromFortune
3 weeks ago

Charlie Kirk's murder is the latest violent act to put public-facing leaders on edge | Fortune

Good morning. I was in Scottsdale yesterday, recording a podcast on site at Deloitte's Next Generation CEO Program, when news about the murder of conservative activist Charlie Kirk began to trickle in. We had been talking about the challenge of being a public figure in business or politics these days, the need for visionary and visible leadership, when visibility can come at a price.
US politics
fromZDNET
3 weeks ago

6 sudo tricks every Linux user needs to know - plus 1 just for fun

I started using Linux prior to the advent of sudo. Back then, any time I needed to run admin tasks, I had to first su to the root user, run the task, and then exit the root user. Because root was enabled, some users would simply log in as root and forgo a standard user account altogether. That's a security risk no one should take.
Information security
#windows-11-pro
fromAddyosmani
3 weeks ago

Google Chrome at 17 - A history of our browser

Back in the mid-2000s, web browsers were struggling to keep up with the modern web. Google's founders saw the browser as critical ("our entire business is people using a browser to access us and the Web" as CEO Eric Schmidt recalled[2]), yet the incumbents weren't architected for rich web apps. In 2006, a small team of ex-Firefox engineers at Google - led by Ben Goodger and Darin Fisher - started sketching ideas for a new browser built for the "cloud era."
Software development
Business
fromEntrepreneur
3 weeks ago

Save $80 on Lifetime Access to the Latest MS Office Apps | Entrepreneur

Microsoft Office 2024 Home & Business offers a one-time purchase of modern Office apps with AI features, collaboration, enhanced security, and no subscription fees.
Information security
fromZDNET
3 weeks ago

1Password vs. NordPass: Which password manager is best?

1Password delivers superior user experience and predictable premium features; NordPass appeals to privacy-focused users and those wanting a free option.
Digital life
fromZDNET
4 weeks ago

Passkeys are the passwordless future, but they're a mess

Passkeys provide stronger, phishing-resistant credentials but adoption is fragmented and users still rely on passwords for recovery and new device setup.
Information security
fromArs Technica
4 weeks ago

Google says Gmail security is "strong and effective" as it denies major breach

Gmail's security remains strong; claimed mass breach was mistaken—only a corporate Salesforce server leak exposed public business contact data and phishing attacks increased.
fromTechzine Global
1 month ago

How to survive an end-of-life software experience

Redis Enterprise 7.2 comes to its official end of life in February 2026, so what should users do in this situation and what lessons can they take away for the end-of-life management experiences that they will inevitably experience with other platform and tools? Redis is good, but when a version update drives users into an alleyway, what should they do? As an open source, in-memory data store known for its ability to act as a distributed cache, message broker and database, Redis is lauded for its high-performance, low-latency read/write speeds achieved through memory data storage. Come February next year, Redis software application developers, data science professionals and other connected operations staff will need to have been doing some prudent planning.
DevOps
Software development
fromGitHub
1 month ago

GitHub - azat-io/actions-up: Interactive CLI tool to update GitHub Actions to latest versions with SHA pinning

Automatically discover, update, and SHA-pin GitHub Actions across workflows for secure, reproducible CI with interactive batch updates and CI integration.
fromwww.dw.com
1 month ago

Germany updates: Merz and Macron chair Franco-German council DW 08/29/2025

"I believe that the Franco-German tandem is now perfectly coordinated to create a stronger Europe in the areas of economy, trade and currency,"
France news
Artificial intelligence
fromClickUp
1 month ago

Survey Uncovers AI Governance Risks in the Age of AI Sprawl

Widespread unauthorized AI use creates major security, compliance, and accountability risks; organizations need secure, auditable AI governed by standards like ISO 42001.
Information security
fromTheregister
1 month ago

DoD reportedly relies on utility written by Russian

A widely used Node.js utility fast-glob appears maintained solely by a Yandex employee based in Russia, creating significant supply-chain security risk.
Artificial intelligence
fromComputerworld
1 month ago

Anthropic invites enterprises to test letting Claude operate Chrome browser

Browser-integrated AI assistants can boost enterprise productivity but pose significant security, privacy, governance, and integration challenges that may slow adoption.
Tech industry
fromTechzine Global
1 month ago

Broadcom and Canonical to optimize VMware Cloud Foundation

Broadcom and Canonical integrated Ubuntu Pro and chiseled containers into VMware Cloud Foundation to speed, secure, and simplify Kubernetes and AI workload deployment.
Information security
fromArs Technica
1 month ago

Google will block sideloading of unverified Android apps starting next year

Google will require developer identity verification for installable apps on certified Android devices, rolling out testing in October and staged global rollout through 2027.
Apple
fromZDNET
1 month ago

You should update your iPhone, iPad, and Mac ASAP to fix this dangerous security flaw

Apple released security updates for iPhone, iPad, and Mac to patch an exploited out-of-bounds memory vulnerability that could install spyware.
Cryptocurrency
fromBusiness Matters
1 month ago

Earn $8,800 a day in passive income using your smartphone - Siton Mining Launches New Multi-Currency Cloud Mining App for BTC, XRP, and DOGE

Siton Mining provides a multi-currency cloud mining platform for BTC, ETH, XRP, DOGE, and USDT with daily settlements, low entry barriers, and top-tier security.
fromClickUp
1 month ago

10 Best No-Code AI Tools to Automate Workflows | ClickUp

Not long ago, building an app meant endless spreadsheets, coding, and clunky tools. Today, 70% of new apps are expected to be built with low-code or no-code tools-nearly triple the 2020 rate. Modern AI platforms allow anyone, coder or not, to create powerful automated workflows. But with so many options, finding the right fit isn't simple. You need a tool that matches your team's skills, integrates with your stack, and delivers real value.
Software development
fromTheregister
1 month ago

Projector repair turns into armed encounter at secret bunker

In the story he sent to The Register, Andy's job was to visit a site he described as "an internationally important top-secret control bunker, buried deep under the UK countryside." Andy didn't know exactly what happened at this site, but it was clearly Very Important because when the client there required urgent repairs, they arranged a police escort to speed technicians to the site.
Gadgets
fromTechzine Global
1 month ago

Microsoft limits onmicrosoft.com email to 100 external recipients per day

Microsoft is introducing new limits for onmicrosoft.com domains. Organizations can now send a maximum of 100 external emails per day via these standard domains to prevent spam. The new measure limits messages from onmicrosoft.com domains to 100 external recipients within 24 hours. Previously, there were no limits for Microsoft Online Email Routing Address (MOERA) domains. Microsoft is responding to an ongoing issue within Microsoft 365. Spammers are abusing new tenants to send large amounts of unwanted emails before Microsoft can intervene.
Deliverability
Soccer (FIFA)
fromESPN.com
1 month ago

Copa Sud. match canceled after violence in stands

Independiente vs Universidad de Chile Sudamericana match canceled after violent clashes between rival supporters, causing injuries, arrests and stadium evacuation.
Marketing
fromCreative Bloq
1 month ago

This crypto rebrand is effortlessly slick

Solflare rebrands as 'Stronghold of the Free', combining bold, bank-inspired typography, vintage visuals, and security-focused design to welcome new and experienced crypto users.
Software development
fromInfoQ
1 month ago

Claude Code Subagents Enable Modular AI Workflows with Isolated Context

Claude Code Subagents allow for the creation of independent, task-specific AI agents, facilitating modular development and efficient task management.
fromThe Hacker News
1 month ago

PyPI Blocks 1,800 Expired-Domain Emails to Prevent Account Takeovers and Supply Chain Attacks

These changes improve PyPI's overall account security posture, making it harder for attackers to exploit expired domain names to gain unauthorized access to accounts.
Python
US politics
fromAbove the Law
1 month ago

China's Hacking Operation Apparently Came For The LSAT - Above the Law

Concerns about organized cheating in standardized tests, especially involving Chinese entities, prompt security measures by LSAC.
fromZDNET
1 month ago

5 reasons to switch to an immutable Linux distro today - and which to try first

Immutable Linux distributions ensure that critical system directories are set to read-only mode, which prevents unauthorized changes and enhances overall system security.
Digital life
fromInfoQ
1 month ago

HCP Terraform Now Offers Hold Your Own Key (HYOK) Option for Artifact Encryption

HashiCorp's Hold Your Own Key (HYOK) support for HCP Terraform allows customers to fully control the encryption keys for sensitive Terraform artifacts, enhancing security.
Privacy technologies
Web development
fromInfoQ
1 month ago

Is WebAssembly the Secure, Efficient Alternative Everybody was Waiting For?

WebAssembly and serverless architectures enhance security through efficient isolation of untrusted code.
Software development
frommedium.com
1 month ago

Sandboxing and Polyglot Programming in GraalVM

GraalVM enhances Java applications with polyglot programming and sandboxing for security, enabling seamless integration across multiple languages.
Miami Marlins
fromESPN.com
1 month ago

Marlins' Myers heckled at Fenway before hitting HR

Marlins right fielder Dane Myers encountered inappropriate heckling from fans during a game, which he managed with the help of security.
fromFortune
1 month ago

Meta spends more guarding Mark Zuckerberg than Apple, Nvidia, Microsoft, Amazon, and Alphabet do for their own CEOs-combined

In 2024, security budgets for chief executives of major tech companies rose above $45 million, with Meta's allocation for Mark Zuckerberg reaching over $27 million.
US politics
France news
fromwww.aljazeera.com
1 month ago

Mali's military arrests generals, suspected French agent in overthrow plot

Authorities in Mali have arrested military personnel and civilians suspected of plotting to destabilize the country's institutions.
US politics
fromAxios
1 month ago

What we know about the isolated military base hosting Trump and Putin

Trump and Putin's meeting is set to occur at Joint Base Elmendorf-Richardson due to its seclusion and security.
fromwww.standard.co.uk
1 month ago

Staff at a London Co-op store say they 'no longer feel safe' amid 'daily' shoplifting incidents

Staff at a Co-op in New Eltham, Greenwich report feeling unsafe due to daily shoplifting incidents, with aggressive behavior from some individuals posing serious risks to employees.
UK news
Information security
fromThe Hacker News
1 month ago

New HTTP/2 'MadeYouReset' Vulnerability Enables Large-Scale DoS Attacks

MadeYouReset is a new technique that allows attackers to bypass HTTP/2 request limits, leading to potential denial-of-service attacks.
fromwww.theguardian.com
1 month ago

Sheinbaum's expulsion of criminals is more about placating Trump than keeping Mexico safe

Mexico's president, Claudia Sheinbaum, has denied that the transfer of 26 alleged cartel members to the United States was part of any kind of deal with Washington.
US politics
Bicycling
fromBikerumor
1 month ago

Seatylock Foldylock Forever Review: The Best Folding Bike Lock You Can Buy

Folding locks offer convenience but may lack high-security ratings compared to U-locks and heavy chain locks.
Gadgets
fromThe Verge
1 month ago

7 password managers to help keep your apps safe

Using a password manager is essential for managing unique passwords across different services and devices.
Privacy technologies
fromWIRED
1 month ago

How to Protect Yourself From Portable Point-of-Sale Scams

Portable point-of-sale thefts are increasing, making it crucial to understand risks and protective measures against such scams.
fromTheregister
1 month ago

The inside story of the Telemessage saga

"I analyzed the Android source code, which TeleMessage published on their website, although it was kind of hard to find," he said.
Privacy professionals
fromCbsnews
1 month ago

4th NYC office shooting victim laid to rest after packed funeral in Brooklyn

Aland Etienne, a security guard killed in the mass shooting at a New York City office building last month, was laid to rest Saturday after a funeral.
New York City
#encryption
fromWIRED
1 month ago
Privacy professionals

Encryption Made for Police and Military Radios May Be Easily Cracked

fromWIRED
1 month ago
Privacy professionals

Encryption Made for Police and Military Radios May Be Easily Cracked

fromHackernoon
2 months ago

Xauras Enters The Crypto Market To Lead The Next Evolution Of Decentralized Lending | HackerNoon

Xauras's third-generation decentralized liquidity protocol has rapidly gained traction, with over $75 million in Total Value Locked and more than 10,000 users.
Cryptocurrency
#wnba
fromNewsday
1 month ago
Women

How does the WNBA solve its sex toy problem? What to know about arrests and security

fromKotaku
1 month ago
National Basketball Association

Losers Keep Throwing Dildos At WNBA Players During Games

fromNewsday
1 month ago
Women

How does the WNBA solve its sex toy problem? What to know about arrests and security

fromKotaku
1 month ago
National Basketball Association

Losers Keep Throwing Dildos At WNBA Players During Games

Apple
fromBusiness Insider
1 month ago

There's another 'Tea' app going viral. This time, it's for men.

TeaOnHer app allows men to post anonymously about women, replicating features of the original Tea app.
Mobile UX
fromZDNET
1 month ago

Why I ditched Google Chrome for Firefox Focus within 10 minutes of using the mobile browser

Firefox Focus is a mobile browser designed for security and privacy with a minimal interface.
fromAbove the Law
1 month ago

Legal Tech Consolidation: AI Is Driving A Wave Of Partnerships And Acquisitions - Above the Law

The legal tech industry is experiencing an unprecedented wave of consolidation, driven primarily by the demand for expanded AI capabilities among customers.
Law
US politics
fromwww.mediaite.com
1 month ago

Netanyahu Tells Fox News He Intends to' Take Full Control of Gaza to Liberate' Palestinians From Hamas

Israel intends to remove Hamas from Gaza to secure its safety and enable civilian governance.
[ Load more ]