Sweden's public sector says goodbye to Big Tech By Chiara Castro published 8 April 24 Based on the UK encrypted platform Element's existing system, Tele2 Collaborate is a new secure collaboration hub. Here's why Sweden made the switch.
Apple users rejoice, this browser promises privacy nirvana by giving each tab a unique IP address By Wayne Williams published 28 June 25 Psylo browser for iOS introduces per-tab proxy IPs to stop tracking.
Perplexity responds to Comet browser vulnerability claims, argues "fake news" By Sead Fadilpašić published 23 November 25 Researchers said Comet can be abused to execute local commands, but Perplexity claims the research is "entirely fake".
Infosec Europe 2025: here's everything we saw By Mike Moore, Ellen Jennings-Trace last updated 5 June 25 We attended Infosecurity Europe 2025 - here's what we saw.
Thousands of online systems could be victim of dangerous new DoS attack By Sead Fadilpašić published 21 March 24 Researchers discover a new way to DoS hundreds of thousands of systems but there is no evidence of in-the-wild abuse.
New zero-knowledge location authentication method developed by university collaboration By Sead Fadilpašić published 19 May 25 You can share your device's location without sharing your device's location thanks to math.
This intriguing startup wants to create the world's most secure smartphones - and it's doing it Proton-style By Efosa Udinmwen published 19 December 25 Soverli introduces an auditable OS layer for smartphones, enabling mission-critical security, encrypted communications, and business continuity alongside Android and iOS.
Two AI chatbots speaking to each other in their own special language is the last thing we need By Lance Ulanoff published 25 February 25 Researchers built a program that lets two AIO chatbots communicate in pure audio signals
The United Nations ditches Big Tech in a bid for security By Chiara Castro published 22 April 24 The United Nations International Computing Centre (UNICC) has chosen the UK-based Element to secure all communications. Here's why it made the switch.
Apple quietly released a new operating system that almost nobody noticed — unnamed OS surfaces in Private Cloud Compute blog as Apple goes ballistic on AI By Wayne Williams published 15 June 24 Apple quietly released a hardened OS based on iOS and macOS to keep LLM inference tasks private.
What protocols does Norton VPN offer? Mimic and more explained By Luke Edwards published 26 November 25 Going above and beyond OpenVPN and WireGuard, Norton VPN offers four VPN protocols that you can pick and choose to best suit your internet use.
The Bluesky hype explained – how it compares to Twitter and the best ways to switch By Chris Rowlands published 23 November 24 Is the social network worth the hype?
T-Mobile is rolling out satellite coverage to its plans soon – and you can already try it out for free even if you're at another carrier By Alex Whitelock published 11 June 25 The T-Satellite service is now in beta and free to try ahead of an official July release date.
This new hacking method is mind-blowing – Akami DNS data exfiltration By Sam Dawson published 12 July 24 Data exfiltration is a tricky task for even the most seasoned hackers – but here's how Akami DNS is changing the game.
Perplexity's Comet AI browser may have some concerning security flaws which could let hacker hijack your device By Sead Fadilpašić published 20 November 25 SquareX says it found a 'hidden API' in the Comet browser, capable of executing local commands.
Tech startup connects to two satellites in orbit from Earth via Bluetooth — using off the shelf chip and a software update By Wayne Williams published 11 May 24 Tech startup Hubble Network connected to two satellites in orbit from Earth via Bluetooth.
Forget OpenVPN, WireGuard: This is the VPN protocol of the future By Chiara Castro published 27 December 25 As censorship tactics and VPN blocking get ever more sophisticated, NordWhisper gets ready for when the classical VPN protocol won't be enough. NordVPN's CTO explains how.
NymVPN boosts its censorship-unlocking power with new features By Rene Millman published 7 November 25 The Latest release from privacy-focused NymVPN introduces QUIC protocol support and a new 'Stealth API' to help users bypass aggressive internet blocks and surveillance.
Fake video conferencing apps are targeting Web3 workers to steal their data By Sead Fadilpašić published 9 December 24 Crooks are trying to deploy infostealers, and steal cryptocurrency, using fake job ads.
VPNs cannot protect against browser fingerprinting – but this new web browser could be the fix By Chiara Castro published 21 June 25 Developed by two privacy researchers, Psylo introduces a one-of-a-kind isolated tab system powered by a proxy network.
Wonder what happens to your encrypted data in case of an emergency? Proton now lets you plan ahead By Chiara Castro published 28 August 25 Emergency Access works across Proton VPN, Proton Mail, Proton Pass, and Proton Drive, letting you choose up to 5 trusted contacts.
Hackers can now inject AI deepfakes directly into iOS video calls using this tool - here's how to stay safe By Efosa Udinmwen published 22 September 25 Hackers exploit specialized tool to inject AI deepfakes into iOS calls, bypassing cameras and challenging current identity verification systems.
Salt Typhoon: US cybersecurity watchdog urges switch to Signal-like messaging apps By Chiara Castro published 19 December 24 Using only end-to-end encrypted apps is CISA's main security tip to secure your mobile communication in the wake of the biggest telecom attack in US history.
What is Model Context Protocol (MCP) and why is it crucial for AI development? By Yuval Fernbach published 8 October 25 As AI development accelerates, organizations are under increasing pressure to move models from prototype to production securely and with scalability.
A glimpse into the next decade of connectivity: 4 lessons from Yotta 2025 By Ivo Ivanov published 21 November 25 Trust in the public Internet is collapsing—private networks and satellites are replacing it now.
Microsoft Teams and Zoom can be hijacked to give hackers the keys to your kingdom By Craig Hale published 7 August 25 Cybercriminals can hide their malicious traffic within Microsoft Teams and Zoom, and it's not even due to a vulnerability.
NATO plans to send internet to space if subsea cables are cut By Craig Hale published 9 July 24 Satellite-based internet will prevent disruptions if subsea cables fail or fall victim to malicious action and attacks.
Apple future-proofing iMessage to protect against the scary future of quantum computing hacking By Cesar Cadenas published 21 February 24 Scheduled to come out with iOS 17.4, PQ3 will protect iMessage texts from attacks from sophisticated machines.
I get annoying spam calls all the time, so I can’t wait for the Call Screening feature in iOS 26 By Jamie Richards published 12 June 25 Scam calls are so common that some days I don’t pick up the phone – iOS 26 promises to make it easier to deal with them
Best CPaaS (Communications Platform as a Service) provider of 2026 By Stefan Ionescu last updated 23 September 24 We feature the best CPaaS (Communications Platform as a Service) providers, to make it simple and easy to set up and manage integrated communications for your business.