Cybersecurity
- 
        
            
                
            
        
        Personal blogging now requires bank-grade security as bot traffic saturates the internet
        
        Bear Blog's weekend outage exposes the hidden infrastructure crisis making independent platforms economically unsustainable 
- 
        
            
                
            
        
        Amazon's Virginia data centre failed for three hours and paralysed the internet worldwide
        
        Market forces recreated the single point of failure the internet was designed to avoid 
- 
        
            
                
            
        
        Chinese hackers breach 700+ companies through single Salesforce integration point
        
        UNC6395's systematic exploitation of Salesloft Drift OAuth tokens reveals dangerous vulnerabilities in enterprise third-party integrations 
- 
        
            
                
            
        
        Britain spent £850 million covering up data breaches whilst leaving security gaps unfixed
        
        Exclusive review of secret government report reveals institutional pattern of prioritising political embarrassment over basic security 
- 
        
            
                
            
        
        European governments discover their citizens' data remains subject to US law despite sovereignty promises
        
        Microsoft's admission exposes the legal reality behind digital sovereignty claims as European dependence on American cloud infrastructure creates systematic vulnerabilities 
- 
        
            
                
            
        
        Allied telegraph operators fought cryptographic warfare through careful rewording
        
        The sophisticated security thinking behind WWII's puzzling paraphrasing requirement 
- 
        
            
                
            
        
        Apple patches seven zero-day vulnerabilities in eight months as spyware vendors target journalists
        
        Commercial surveillance companies exploit iPhone flaws while Apple limits security transparency 
- 
        
            
                
            
        
        Web security systems recreate browser wars as specialised browsers multiply beyond Chrome and Safari
        
        Over 100 hidden browsers are forcing companies to choose between security and universal access 
- 
        
            
                
            
        
        Hyundai charges customers to fix security flaws despite laws requiring free manufacturer responsibility
        
        Automotive giant defies international regulations whilst other industries provide security patches at no cost 
- 
        
            
                
            
        
        Britain's cybersecurity experts cannot see the threats coming
        
        Government studies reveal a cybersecurity establishment struggling with prediction, hype, and dangerous knowledge gaps 
- 
        
            
                
            
        
        Britain's satellites depend on ground stations moving to the cloud as cybersecurity maturity lags behind critical infrastructure needs
        
        Government study reveals security gaps as space industry adopts shared platforms for controlling essential services 
- 
        
            
                
            
        
        HashiCorp Vault's decade-old flaws expose the fragility of enterprise security's most trusted tools
        
        Nine zero-day vulnerabilities discovered through manual analysis reveal how logic flaws can undermine software explicitly designed to be infrastructure trust anchors 
- 
        
            
                
            
        
        Why six-digit email codes create more problems than passwords
        
        How companies trying to improve security accidentally made it worse 
- 
        
            
                
            
        
        The ransomware ban that criminals want you to pass
        
        Britain's new prohibition will eliminate amateur competitors whilst rewarding precisely those networks sophisticated enough to circumvent legal constraints 
- 
        
            
                
            
        
        The great SharePoint abandonment
        
        How Microsoft's cloud gold rush left government agencies defenceless