atlas news
    
Beta News : security
16  janvier     16h53
Data privacy in 2025: The resurgence of biometric security, a fleeting forecast for federal data privacy regulations, and the return of the wild west of AI
Daniel Barber    The transition from to brings a lot of uncertainty, speculation, and hopefully some optimism for the world of data privacy. As technology continued to innovate, securing data grew more complex and consumers grew more concerned over how their information was being used. Regulatory changes...
    09h55
Microsoft confirms strange some settings are managed by your administrator’ BitLocker error
Sofia Elizabella WyciÅ›lik-Wilson    If you’ve got BitLocker enabled on your computer and you’re seeing unexpected error messages, you can take some comfort in knowing that you are not alone and also that Microsoft is aware of the issue. The problem affects some systems with TPMs Trusted Platform Module , and it results in a...
12  janvier     10h10
Microsoft will forcibly install the new Outlook app on Windows 10 in February
Sofia Elizabella WyciÅ›lik-Wilson    While making much of the end of support for Windows , practically begging users to move on to Windows , Microsoft is sending out some confusing signals. The company has announced that the new Outlook for Windows will be forcibly installed on the aging operating system. Somewhat unusually, the...
09  janvier     09h19
Apple defends Siri, saying the data it collects is never used for advertising, never sold, and never used for profiling
Sofia Elizabella WyciÅ›lik-Wilson    Having agreed to pay out million to settle a lawsuit alleging Siri recorded private conversations without consent, Apple has doubled down on its assertion that it has done nothing wrong. In a statement entitled Our longstanding privacy commitment with Siri, the company stresses it is...
    07h12
How to unlock innovation safely in the AI revolution
Michael Adjei    Organizations are caught up in a whirlwind of AI adoption, whilst struggling to ensure their security standards can match up. And as the rush to integrate AI into business processes continues into , the time to safeguard its deployment is now. To date much of the security discussion around AI...
27  décembre     09h01
Microsoft warns of Windows 11 24H2 installation issue that blocks all future security updates
Sofia Elizabella WyciÅ›lik-Wilson    Microsoft is vocal about the importance of ensuring that Windows users have all of the latest security updates installed, and rightly so. Now the company has warned that using certain installation media to install Windows H could result in not being able to receive any further security...
26  décembre     18h57
Savvy security needs SASE: Addressing the security challenges organizations are grappling with
Stephen Amstutz    With the threat landscape becoming increasingly sophisticated, companies need agile approaches to improve their defenses and mitigate risks. After all, hackers are adapting their strategies and introducing new tools and technologies to improve their success rates. The resulting rise in cyber...
23  décembre     08h20
Report: Apple is working on a Face ID powered smart doorbell and lock
Sofia Elizabella WyciÅ›lik-Wilson    Apple looks ready to continue its foray into the smart home market with a new doorbell to rival Amazon’s Ring. Driven by Face ID, Apple’s upcoming device is set to be more than just a doorbell facial recognition will be used to unlock the door as well. But if you are looking for a smart doorbell...
18  décembre     14h07
What will attackers target in 2025? CNI, CNI, and more CNI
Robin Campbell-Burt    Critical national infrastructure CNI has had a rough in the UK when it comes to cybercrime. From the chaos caused by a teenager who hacked into TfL to the dangerous impact on the NHS after the Synnovis breach. And let us not forget the ongoing fallout from the Sellafield breach in December...
17  décembre     10h40
Experts call for proactivity to combat state-sponsored cyber threats in 2025
Robin Campbell-Burt    In , opposing nation states have utilized cyberattacks to project power and disruption from within their own borders. This shift has been epitomized by the rise of the Axis of Upheaval, dominated by the CRINKs nations China, Russia, Iran, North Korea who share a common reliance on...
16  décembre     18h12
2025 cybersecurity forecast: Preparing for the next generation of threats
Andrew Harding    As we navigate an increasingly digital landscape, the threats posed by cybercriminals are evolving at an alarming pace. The latest predictions highlight a future where AI driven technologies, particularly deep fakes, will become more sophisticated, making it challenging for individuals and...
12  décembre     09h51
Microsoft releases KB5048667 update, removing another Windows 11 24H2 block and introducing a questionable change
Sofia Elizabella WyciÅ›lik-Wilson    There are still various obstacles in the way of updating to Windows H , but Microsoft has just removed one of them. Until now, systems with a USB scanner that used the eSCL scan protocol were blocked from installing the update, but this block has now been lifted. This is not all that is to be...
10  décembre     15h56
Email security: Why traditional defenses fall short in today’s threat landscape
Scott Hanrahan    Despite decades of technological advancement, email remains the predominant attack vector for cybercriminals, with estimates suggesting that percent of cyberattacks originate through email channels. While the cybersecurity industry has made significant strides in other areas, many businesses...
06  décembre     14h09
Cyber defense vs cyber resilience: why it’s time to prioritize recovery
Darren Thomson    In an era when successful hacks are now an inevitability, too many organizations have a false sense of security when it comes to their data. Unfortunately, cyber criminals are ready and willing to take advantage of this complacency. Gone are the days when CISOs could simply focus on building up...
    10h36
0patch uncovers a security vulnerability in all versions of Windows -- and releases free fixes
Sofia Elizabella WyciÅ›lik-Wilson    patch has revealed a day vulnerability that affects all desktop versions of Windows as well as Windows Server. In all, a staggering different editions of Windows have the security issue which is described as a URL File NTLM Hash Disclosure vulnerability. The security patching firm has reported...
03  décembre     18h43
Holiday season cybersecurity alert: QR code phishing scams
Sam Mayne    Thanks to the proliferation of smartphones, QR code usage globally has surged by percent, and by , it is forecast to increase by another percent. And up to eight new QR codes are generated per minute globally. It is no surprise then why QR codes are everywhere on billboards, shopping...
    12h09
How to address cloud-native security risks in 2025
Jonathan Lerner    Gartner predicts that public cloud end user spending will surpass billion by the end of . In , as AI systems proliferate and organizations increasingly store sensitive data in public cloud infrastructure, many stakeholders will begin demanding more robust cloud security measures....
29  novembre     14h51
Security must be used as a springboard, not just a shield
Andrew Lintell    Cybersecurity is often frustratingly seen as a boardroom burden a compulsory cost to keep threats at bay. This necessary evil mindset is holding businesses back and leading to a critical opportunity to leverage security as a driver of success being missed. It’s time we looked at cybersecurity...
    09h30
Proving Linux is not a safe sanctuary, ESET finds first Linux-targeting UEFI bootkit malware
Sofia Elizabella WyciÅ›lik-Wilson    Linux based operating systems have long been heralded as being inherently more secure than Windows. Whether or not this is true is open to debate, as is the impact of user numbers on making an OS a target for malware writers. A key security concern in recent times has been UEFI bootkits, and it has...
28  novembre     14h19
Why USB cyberattacks are still a persistent threat
James Neilson    Although the cyber threat landscape rarely stands still, some age old attack vectors will continue to be revisited by cyber criminals. For example, the cyber security risks of removable media which have persisted for years are presenting fresh challenges for security teams. This is because,...