Apple's New MacBook Pro Vulnerability Revealed by Researcher Weeks After Release Georgia Tech researcher Jason Kim has identified a security vulnerability in Apple's latest MacBook Pro. by Jace Dela Cruz
Tech Australia's Internet Watchdog to Draft Industry Standards for Tech Giants to Combat Online Child Abuse, Pro-Terror Material by Jace Dela Cruz
Tech Twitch Rolls Out New Privacy Center to Inform Users About their Privacy Rights by Jace Dela Cruz
Tech Black Basta Ransomware Gang Steals 'Large Number of Files' from Toronto Public Library by Joseph Henry
Tech US Medical Transcription Firm Hit by Cyberattack With Nearly 9 Million Patients' Data Stolen by Jace Dela Cruz
Tech China's ICBC, Paid Ransom to Stop Cyberattack Disrupting the US Treasury Market by Aldohn Domingo
Tech California Hospital Declares 'Internal Disaster' After Suffering from Cyber Attack by Jace Dela Cruz
Tech ICBC Ransomware Attack: Financial Authorities on High Alert Amid US Treasuries Disruption by Quincy Jon
Tech Digital Services Act: EU Demands Child Safety Compliance Data from TikTok, YouTube by Quincy Jon
Tech Hacker Leaks LinkedIn Database Containing Personal Information of More Than 35 Million Users by Joseph Henry
Tech DNA Testing Companies Adopt 2-Factor Authentication in Response to 23andMe Data Breach by Quincy Jon
Tech Palo Alto Networks Expand Israeli Security Portfolio with $625 Million Talon Cyber Security Acquisition: Report by Quincy Cahilig
Tech Boeing Confirms Cyber Incident After LockBit Ransomware Gang Listing; Will It Impact Flight Safety? by Quincy Jon
Tech Meta's Chief AI Scientist Joins 70 Others in Calling for More Transparency in AI Development by Jace Dela Cruz
Tech VP Kamala Harris Announces US Initiative to Combat Robocalls Using Artificial Intelligence by Quincy Jon
Tech iPhone Hack Warning: India's Opposition Leader Warned About State-Sponsored Attacks by Joseph Henry
Tech Graphic Pro-Israel Advertisements Are Flooding Social Media and Children’s Video Games by Aldohn Domingo
Tech Popular Websites Could be Vulnerable to Browser Extension Exploits, Capturing Passwords, Sensitive Data - Study by Jace Dela Cruz
Tech Desperate Families Use Phone Pings to Locate 220 Kidnapped Loved Ones Taken by Hamas in Gaza by John Lopez