The AI revolution is "oversold" says OutSystems CEO as it launches new Agentic AI platform By James Capell published 5 October 25 OutSystems CEO Woodson Martin says AI is oversold, but it still has a key role to play.
NATO wants to build an alternative satellite-based internet to be used in case of emergency By Wayne Williams published 10 January 25 Threat of undersea cable sabotage raises concerns for alternate arrangements.
Tor adds another layer to the onion with a new relay encryption algorithm - boosting resilience and security across the board By Efosa Udinmwen published 30 November 25 Tor replaces its older tor1 relay encryption with CGO to strengthen privacy, block tagging attacks, and modernize authentication across circuits.
ExpressVPN's latest upgrade to Lightway hopes to create "the VPN protocol of the future" By Chiara Castro published 17 February 25 ExpressVPN's Lightway protocol has been re-coded from C to Rust, a modern programming language praised for its security and performance. Here's all you need to know.
Crucial tech that's pivotal for AI in hyperscalers gets major update to improve performance, enhance functionality and extend security By Ross Kelly published 17 December 24 Performance and security upgrades are a key focus in this latest CXL update.
Signal wants to offer a more private alternative to Zoom and Microsoft Teams group calls By Mike Moore published 12 November 24 Hosting group calls on Signal gets a major upgrade with call links, emoji reactions and more.
Cloudflare's new tool wants to help you spot doctored images online By Craig Hale published 4 February 25 Cloudflare is supporting image authenticity and verification tracking on images across its network.
Scammers are once again abusing PDFs to trick victims into calling fake support numbers By Sead Fadilpašić published 3 July 25 No, you're not talking to a Microsoft representative - it's a scammer who wants your passwords.
The next stage in AI power? XConn set to reveal end-to-end PCIe Gen 6 offering higher bandwidth than ever By Efosa Udinmwen published 9 August 25 XConn set to demo a PCIe Gen 6.2 and CXL 3.1 solution, aiming at AI infrastructure despite unknowns around real-world performance and reliability.
Like what3words but for phone numbers: Startup wants people to use domain names for its WhatsApp rival By Efosa Udinmwen published 24 May 25 Thunderbolt uses domain names instead of phone numbers, promising privacy but raising questions about accessibility and mainstream appeal.
Netflix just ditched a useful Android and iOS feature that travelers rely on for hotel streaming By David Nield published 2 December 25 If you use the Google Cast protocol to watch content on Netflix, we've got some bad news for you.
NordVPN launches new “revolutionary” censorship-resistant VPN protocol By Chiara Castro published 29 January 25 NordWhisper is designed to work against the most challenging network filtering techniques. Here's all you need to know.
This new open source collaboration tool makes working with your colleagues even easier By Efosa Udinmwen published 8 February 25 Nextcloud Talk platform prioritizes data protection, offering secure communication, AI features, and real-time document collaboration.
This startup wants to back up your data on the Moon in a 'data center' that could probably sit in the palm of your hand By Wayne Williams published 26 February 25 Lonestar wants to bring data services such as Disaster Recovery and Resilience-as-a-Service to the Moon.
Apple users rejoice, this browser promises privacy nirvana by giving each tab a unique IP address By Wayne Williams published 28 June 25 Psylo browser for iOS introduces per-tab proxy IPs to stop tracking.
Perplexity responds to Comet browser vulnerability claims, argues "fake news" By Sead Fadilpašić published 23 November 25 Researchers said Comet can be abused to execute local commands, but Perplexity claims the research is "entirely fake".
Infosec Europe 2025: here's everything we saw By Mike Moore, Ellen Jennings-Trace last updated 5 June 25 We attended Infosecurity Europe 2025 - here's what we saw.
New zero-knowledge location authentication method developed by university collaboration By Sead Fadilpašić published 19 May 25 You can share your device's location without sharing your device's location thanks to math.
Two AI chatbots speaking to each other in their own special language is the last thing we need By Lance Ulanoff published 25 February 25 Researchers built a program that lets two AIO chatbots communicate in pure audio signals
This intriguing startup wants to create the world's most secure smartphones - and it's doing it Proton-style By Efosa Udinmwen published 19 December 25 Soverli introduces an auditable OS layer for smartphones, enabling mission-critical security, encrypted communications, and business continuity alongside Android and iOS.
The Bluesky hype explained – how it compares to Twitter and the best ways to switch By Chris Rowlands published 23 November 24 Is the social network worth the hype?
T-Mobile is rolling out satellite coverage to its plans soon – and you can already try it out for free even if you're at another carrier By Alex Whitelock published 11 June 25 The T-Satellite service is now in beta and free to try ahead of an official July release date.
Perplexity's Comet AI browser may have some concerning security flaws which could let hacker hijack your device By Sead Fadilpašić published 20 November 25 SquareX says it found a 'hidden API' in the Comet browser, capable of executing local commands.
NymVPN boosts its censorship-unlocking power with new features By Rene Millman published 7 November 25 The Latest release from privacy-focused NymVPN introduces QUIC protocol support and a new 'Stealth API' to help users bypass aggressive internet blocks and surveillance.
Fake video conferencing apps are targeting Web3 workers to steal their data By Sead Fadilpašić published 9 December 24 Crooks are trying to deploy infostealers, and steal cryptocurrency, using fake job ads.
VPNs cannot protect against browser fingerprinting – but this new web browser could be the fix By Chiara Castro published 21 June 25 Developed by two privacy researchers, Psylo introduces a one-of-a-kind isolated tab system powered by a proxy network.
Wonder what happens to your encrypted data in case of an emergency? Proton now lets you plan ahead By Chiara Castro published 28 August 25 Emergency Access works across Proton VPN, Proton Mail, Proton Pass, and Proton Drive, letting you choose up to 5 trusted contacts.
Hackers can now inject AI deepfakes directly into iOS video calls using this tool - here's how to stay safe By Efosa Udinmwen published 22 September 25 Hackers exploit specialized tool to inject AI deepfakes into iOS calls, bypassing cameras and challenging current identity verification systems.
Salt Typhoon: US cybersecurity watchdog urges switch to Signal-like messaging apps By Chiara Castro published 19 December 24 Using only end-to-end encrypted apps is CISA's main security tip to secure your mobile communication in the wake of the biggest telecom attack in US history.
Microsoft Teams and Zoom can be hijacked to give hackers the keys to your kingdom By Craig Hale published 7 August 25 Cybercriminals can hide their malicious traffic within Microsoft Teams and Zoom, and it's not even due to a vulnerability.