Cybersecurity
-
Apple encrypts iMessage in transit while storing the key in readable backups
Google solved the encrypted backup problem in 2018. Why hasn't Apple followed?
-
Britain requires privacy tools to eliminate privacy as age verification breaches multiply
The House of Lords votes to extend identity checks to VPNs, completing a surveillance architecture that child safety experts increasingly oppose
-
From Hollywood to Pegasus: how American money conquered the spyware industry
The surveillance business has matured into a $12 billion sector. Its biggest backers are now American—even as American policy tries to shut it down
-
Venezuela's internet routes showed anomalies before the helicopters arrived
Public routing data may carry traces of military cyber operations—and reveals an infrastructure built on trust that no longer exists
-
When security researchers found flaws in Eurostar's chatbot, the company accused them of blackmail
The rail operator's AI assistant had guardrails and signatures—but enforcement was another matter entirely
-
Privacy indicators trigger constantly on iPhones while users learn to ignore them
The green dot meant to reassure you about camera access may be training you to overlook real threats
-
Britain's cyber security laws chase attackers exploiting NHS suppliers and MOD contractors
New legislation targets managed service providers and supply chains after patient death and military data breach exposed regulatory blind spots
-
European institutions ditch Microsoft Office as Trump sanctions expose infrastructure vulnerability
International Criminal Court email blockade accelerates shift to open source alternatives, with four EU countries launching shared infrastructure consortium
-
Personal blogging now requires bank-grade security as bot traffic saturates the internet
Bear Blog's weekend outage exposes the hidden infrastructure crisis making independent platforms economically unsustainable
-
Amazon's Virginia data centre failed for three hours and paralysed the internet worldwide
Market forces recreated the single point of failure the internet was designed to avoid
-
Chinese hackers breach 700+ companies through single Salesforce integration point
UNC6395's systematic exploitation of Salesloft Drift OAuth tokens reveals dangerous vulnerabilities in enterprise third-party integrations
-
Britain spent £850 million covering up data breaches whilst leaving security gaps unfixed
Exclusive review of secret government report reveals institutional pattern of prioritising political embarrassment over basic security
-
European governments discover their citizens' data remains subject to US law despite sovereignty promises
Microsoft's admission exposes the legal reality behind digital sovereignty claims as European dependence on American cloud infrastructure creates systematic vulnerabilities
-
Allied telegraph operators fought cryptographic warfare through careful rewording
The sophisticated security thinking behind WWII's puzzling paraphrasing requirement
-
Apple patches seven zero-day vulnerabilities in eight months as spyware vendors target journalists
Commercial surveillance companies exploit iPhone flaws while Apple limits security transparency
-
Web security systems recreate browser wars as specialised browsers multiply beyond Chrome and Safari
Over 100 hidden browsers are forcing companies to choose between security and universal access
-
Hyundai charges customers to fix security flaws despite laws requiring free manufacturer responsibility
Automotive giant defies international regulations whilst other industries provide security patches at no cost
-
Britain's cybersecurity experts cannot see the threats coming
Government studies reveal a cybersecurity establishment struggling with prediction, hype, and dangerous knowledge gaps
-
Britain's satellites depend on ground stations moving to the cloud as cybersecurity maturity lags behind critical infrastructure needs
Government study reveals security gaps as space industry adopts shared platforms for controlling essential services
-
HashiCorp Vault's decade-old flaws expose the fragility of enterprise security's most trusted tools
Nine zero-day vulnerabilities discovered through manual analysis reveal how logic flaws can undermine software explicitly designed to be infrastructure trust anchors
-
Why six-digit email codes create more problems than passwords
How companies trying to improve security accidentally made it worse
-
The ransomware ban that criminals want you to pass
Britain's new prohibition will eliminate amateur competitors whilst rewarding precisely those networks sophisticated enough to circumvent legal constraints
-
The great SharePoint abandonment
How Microsoft's cloud gold rush left government agencies defenceless