Audio and video calls on Discords are now end-to-end encrypted By Chiara Castro published 20 September 24 The platform rolled out the DAVE protocol to protect your calls from third-party snooping. Here's all you need to know.
The AI revolution is "oversold" says OutSystems CEO as it launches new Agentic AI platform By James Capell published 5 October 25 OutSystems CEO Woodson Martin says AI is oversold, but it still has a key role to play.
Tesla has a not-so-secret plan to replace a fundamental-but-flawed building block of the Internet — Musk's Exascale DOJO supercomputer will use TTPoE instead of the universal TCP and wants the world to embrace it By Wayne Williams published 2 September 24 Tesla wants to replace TCP with its own Tesla Transport Protocol over Ethernet (TTPoE) designed for its DOJO supercomputer.
NATO wants to build an alternative satellite-based internet to be used in case of emergency By Wayne Williams published 10 January 25 Threat of undersea cable sabotage raises concerns for alternate arrangements.
Tor adds another layer to the onion with a new relay encryption algorithm - boosting resilience and security across the board By Efosa Udinmwen published 30 November 25 Tor replaces its older tor1 relay encryption with CGO to strengthen privacy, block tagging attacks, and modernize authentication across circuits.
ExpressVPN's latest upgrade to Lightway hopes to create "the VPN protocol of the future" By Chiara Castro published 17 February 25 ExpressVPN's Lightway protocol has been re-coded from C to Rust, a modern programming language praised for its security and performance. Here's all you need to know.
Crucial tech that's pivotal for AI in hyperscalers gets major update to improve performance, enhance functionality and extend security By Ross Kelly published 17 December 24 Performance and security upgrades are a key focus in this latest CXL update.
Signal wants to offer a more private alternative to Zoom and Microsoft Teams group calls By Mike Moore published 12 November 24 Hosting group calls on Signal gets a major upgrade with call links, emoji reactions and more.
After email, Tuta has made its calendar quantum-safe By Chiara Castro published 1 October 24 The provider claims to be the first to launch a standalone quantum-resistant Calendar app for mobile – but Apple halted the release, for now.
The White House thinks it's time to repair a weak link in the internet By Sead Fadilpašić published 4 September 24 It's time to talk about the Border Gateway Protocol, the White House says.
Tuta becomes the first quantum-resistant email service with new hybrid protocol By Chiara Castro published 13 March 24 Tuta claims to be the first secure email service to offer post-quantum protection. Here's why it's a necessity for keeping your emails safe.
Netflix just ditched a useful Android and iOS feature that travelers rely on for hotel streaming By David Nield published 2 December 25 If you use the Google Cast protocol to watch content on Netflix, we've got some bad news for you.
Cloudflare's new tool wants to help you spot doctored images online By Craig Hale published 4 February 25 Cloudflare is supporting image authenticity and verification tracking on images across its network.
Scammers are once again abusing PDFs to trick victims into calling fake support numbers By Sead Fadilpašić published 3 July 25 No, you're not talking to a Microsoft representative - it's a scammer who wants your passwords.
The next stage in AI power? XConn set to reveal end-to-end PCIe Gen 6 offering higher bandwidth than ever By Efosa Udinmwen published 9 August 25 XConn set to demo a PCIe Gen 6.2 and CXL 3.1 solution, aiming at AI infrastructure despite unknowns around real-world performance and reliability.
Like what3words but for phone numbers: Startup wants people to use domain names for its WhatsApp rival By Efosa Udinmwen published 24 May 25 Thunderbolt uses domain names instead of phone numbers, promising privacy but raising questions about accessibility and mainstream appeal.
Q-Day mitigation is here - LastWall unveils quantum-resilient network infrastructure protection By Benedict Collins published 26 June 24 Q-Day is coming, so protecting against threats now is more important than ever
The US government has new laws on sharing data across departments By Sead Fadilpašić published 30 October 24 We adhere to these markings because trust in data handling is crucial, the US gov says.
Proton Drive reveals major update for businesses, boosts encryption By Craig Hale published 6 November 24 Proton Docs adds new encrypted updates – Proton Drive gets a slice of the action too.
NordVPN launches new “revolutionary” censorship-resistant VPN protocol By Chiara Castro published 29 January 25 NordWhisper is designed to work against the most challenging network filtering techniques. Here's all you need to know.
This new open source collaboration tool makes working with your colleagues even easier By Efosa Udinmwen published 8 February 25 Nextcloud Talk platform prioritizes data protection, offering secure communication, AI features, and real-time document collaboration.
This startup wants to back up your data on the Moon in a 'data center' that could probably sit in the palm of your hand By Wayne Williams published 26 February 25 Lonestar wants to bring data services such as Disaster Recovery and Resilience-as-a-Service to the Moon.
Proton unveils Proton Drive for Business By Benedict Collins published 27 August 24 Proton Drive for business is here, with security and privacy as a priority
Sweden's public sector says goodbye to Big Tech By Chiara Castro published 8 April 24 Based on the UK encrypted platform Element's existing system, Tele2 Collaborate is a new secure collaboration hub. Here's why Sweden made the switch.
Apple users rejoice, this browser promises privacy nirvana by giving each tab a unique IP address By Wayne Williams published 28 June 25 Psylo browser for iOS introduces per-tab proxy IPs to stop tracking.
Perplexity responds to Comet browser vulnerability claims, argues "fake news" By Sead Fadilpašić published 23 November 25 Researchers said Comet can be abused to execute local commands, but Perplexity claims the research is "entirely fake".
Thousands of online systems could be victim of dangerous new DoS attack By Sead Fadilpašić published 21 March 24 Researchers discover a new way to DoS hundreds of thousands of systems but there is no evidence of in-the-wild abuse.
Infosec Europe 2025: here's everything we saw By Mike Moore, Ellen Jennings-Trace last updated 5 June 25 We attended Infosecurity Europe 2025 - here's what we saw.
New zero-knowledge location authentication method developed by university collaboration By Sead Fadilpašić published 19 May 25 You can share your device's location without sharing your device's location thanks to math.
Two AI chatbots speaking to each other in their own special language is the last thing we need By Lance Ulanoff published 25 February 25 Researchers built a program that lets two AIO chatbots communicate in pure audio signals