• Business
  • Entertainment
  • Health
  • News
  • Sport
  • Tech
  • World
Newsy Today
news of today
Home - security
Tag:

security

Health

Gary Woodland wins the Houston Open for first PGA Tour title since brain surgery

by Chief Editor March 30, 2026
written by Chief Editor

Gary Woodland’s Triumph: A New Era for Athletes and Mental Health in Sports

Gary Woodland’s victory at the 2026 Houston Open wasn’t just a return to the winner’s circle after seven years; it was a powerful statement about vulnerability, perseverance and the evolving landscape of mental health awareness in professional sports. His win, coming after bravely sharing his struggles with PTSD following brain surgery, signals a potential turning point for athletes everywhere.

The Ripple Effect of Woodland’s Honesty

For years, athletes have been expected to project an image of unwavering strength and resilience. Admitting weakness, whether physical or mental, was often seen as a detriment. Woodland’s decision to publicly discuss his PTSD – a condition stemming from surgery to remove a brain lesion – has begun to dismantle that outdated notion. He stated that sharing his struggles made him sense “1,000 pounds lighter,” and his success on the course immediately following his revelation suggests a direct correlation between openness and performance.

This isn’t an isolated incident. Increased conversations around mental health, spearheaded by figures like Naomi Osaka and Simone Biles, have paved the way for athletes like Woodland to feel safer sharing their experiences. The 2026 Houston Open victory could inspire a new generation of athletes to prioritize their mental well-being without fear of repercussions.

Beyond Disclosure: The Rise of Holistic Athlete Support

Woodland’s journey highlights the need for more comprehensive support systems for athletes. His recovery wasn’t solely about physical rehabilitation after brain surgery; it involved addressing the psychological trauma that followed. This includes access to mental health professionals, tailored therapy, and a supportive team that understands the unique pressures faced by elite competitors.

The PGA Tour’s recognition of Woodland with the 2025 PGA Tour Courage Award is a step in the right direction, but more systemic changes are needed. Teams and organizations are beginning to invest in sports psychologists and mental performance coaches, recognizing that mental fortitude is just as crucial as physical prowess.

Technical Adjustments and the Pursuit of Peak Performance

Woodland’s win wasn’t solely attributable to emotional liberation. He too made strategic adjustments to his game, consulting with a coach and switching to stiffer shafts in his irons to regain control after his recovery. This demonstrates the importance of a holistic approach – addressing both the mental and physical aspects of performance. His ability to reach 196 mph ball speed, coupled with improved control, showcases the potential for athletes to achieve new heights when all facets of their well-being are optimized.

The Masters Beckons: A Symbol of Resilience

The victory at the Houston Open secured Woodland’s eligibility for the Masters Tournament, adding another layer of significance to his comeback story. His presence at Augusta National will undoubtedly resonate with fans and fellow competitors, serving as a powerful reminder that overcoming adversity is possible.

FAQ

Q: What is PTSD?
A: Post-traumatic stress disorder is a mental health condition triggered by a terrifying event. Symptoms can include flashbacks, nightmares, and severe anxiety.

Q: How did Gary Woodland’s surgery contribute to his PTSD?
A: The surgery to remove a brain lesion caused anxiety and hyper awareness, leading to a PTSD diagnosis.

Q: What changes did Woodland make to his golf game?
A: He switched to a new putter for better alignment and used stiffer shafts in his irons for improved control.

Did you know?

Shane Lowry and Adam Scott both made hole-in-ones during the 2026 Houston Open, adding to the excitement of the tournament.

Woodland’s fellow competitors, Nicolai Hojgaard and Min Woo Lee, demonstrated remarkable sportsmanship by allowing him to have the stage to himself on the 18th green, a gesture rarely seen outside of major championships.

Pro Tip: Prioritizing mental health is not a sign of weakness, but a demonstration of self-awareness and a commitment to peak performance. Seek support when needed, and remember that vulnerability can be a source of strength.

Want to learn more about the evolving landscape of athlete mental health? Explore more articles on AP News.

March 30, 2026 0 comments
0 FacebookTwitterPinterestEmail
Tech

Digital Iron Curtain: Russia Tightens Its Grip on the Internet

by Chief Editor March 20, 2026
written by Chief Editor

Russia’s Digital Iron Curtain: A Glimpse into the Future of Internet Control

Russia is rapidly reshaping its digital landscape, moving beyond temporary restrictions to establish a more permanent system of internet control. Recent mobile internet outages in major cities like Moscow and St. Petersburg, coupled with new legislation expanding state surveillance powers, signal a significant shift. This isn’t simply a reaction to the conflict in Ukraine. it’s a calculated strategy for long-term domestic control, drawing inspiration from models employed by China and Iran.

The Escalation of Digital Sovereignty

The Kremlin frames these measures as necessary for national security, citing threats like Ukrainian drone attacks and the non-compliance of foreign tech companies. However, analysts suggest a deeper motive: preventing the kind of instability that followed the Soviet war in Afghanistan and the collapse of the Soviet Union. The goal is to proactively tighten control before potential political or social unrest emerges.

This push for “digital sovereignty” involves not only restricting access to global platforms but also actively promoting state-backed alternatives. The promotion of MAX, a domestic platform for schools and universities, exemplifies this effort to create a controlled digital ecosystem. Simultaneously, the shutdown of hundreds of VPNs makes circumventing these restrictions increasingly difficult for citizens.

Learning from Authoritarian Playbooks

Russian officials have demonstrably studied the internet control strategies of China and Iran. These nations have successfully implemented systems that allow them to block large portions of the web while maintaining control over essential communications through state-approved channels. Russia appears to be aiming for a similar capability – the ability to manage information flows at will.

Did you know? China’s “Great Firewall” is a sophisticated censorship and surveillance system that blocks access to thousands of websites and apps. Iran similarly restricts access to social media platforms and utilizes a national intranet.

The Cat-and-Mouse Game with Citizens

Despite the increasing restrictions, many Russians, particularly younger users, continue to seek ways to access blocked content. The constant switching of VPNs highlights a growing dynamic between citizens and authorities. While the Kremlin aims to control the flow of information, a significant portion of the population remains determined to stay connected to the global internet.

The Risks of Excessive Control

The Kremlin faces a delicate balancing act. While tighter control may maintain short-term stability, excessive restrictions risk deepening public frustration, especially among digitally connected citizens. This could potentially undermine the very stability the Kremlin seeks to preserve.

What’s Next: A More Fragmented Internet?

Russia’s actions are part of a broader global trend toward internet fragmentation. More countries are exploring ways to exert greater control over their digital spaces, raising concerns about the future of a free and open internet. This could lead to a world where the internet is less interconnected and more divided along national lines.

Pro Tip: Staying informed about digital rights and privacy tools is crucial in an era of increasing online censorship. Resources like the Electronic Frontier Foundation (https://www.eff.org/) offer valuable information and advocacy.

FAQ

Q: What is “digital sovereignty”?
A: Digital sovereignty refers to a country’s ability to control its own digital infrastructure and data, often involving restrictions on foreign technology and platforms.

Q: Why is Russia restricting internet access?
A: The Kremlin cites security concerns related to the war in Ukraine and the refusal of some foreign tech companies to comply with Russian law, but analysts believe it’s also about long-term domestic control.

Q: Are other countries doing this?
A: Yes, countries like China and Iran have long-established systems for controlling internet access and censoring content.

Q: What does this mean for the future of the internet?
A: It could lead to a more fragmented internet, with different countries having different levels of access and control.

What are your thoughts on Russia’s digital control measures? Share your opinions in the comments below!

March 20, 2026 0 comments
0 FacebookTwitterPinterestEmail
World

France exploring UN route to unblock Strait of Hormuz, Macron says – POLITICO

by Chief Editor March 20, 2026
written by Chief Editor

France Leads Push for UN Intervention in Strait of Hormuz Amid Rising Tensions

France is spearheading diplomatic efforts to secure the Strait of Hormuz, a critical waterway for global oil supplies, by seeking a United Nations resolution. This move comes as Iran has increased control over the strait, impacting energy prices worldwide. The initiative, discussed with key global leaders, aims to establish a framework for a broader coalition to ensure safe passage through the region.

The Strategic Importance of the Strait of Hormuz

The Strait of Hormuz is a narrow passage connecting the Persian Gulf to the Gulf of Oman and the Arabian Sea. Approximately 20 percent of the world’s oil supply transits through this vital chokepoint daily, making it a focal point for geopolitical concerns. Recent actions by Iran have effectively restricted access, leading to increased volatility in global energy markets.

Macron’s Diplomatic Offensive

French President Emmanuel Macron has been actively engaging with international partners to address the situation. He held discussions with Indian Prime Minister Narendra Modi and UN Secretary-General António Guterres, proposing a UN-led initiative to de-escalate tensions and secure the strait. Macron has similarly briefed other European Union leaders on the plan.

According to sources, Guterres emphasized the importance of the Global South being represented in any resolution concerning the Strait of Hormuz, highlighting the widespread impact of disruptions to this waterway. A potential UN resolution could garner support from Gulf and European nations, forming a basis for a wider coalition.

India’s Role and Concerns

Prime Minister Modi’s conversations with Macron and the Sultan of Oman underscore India’s commitment to dialogue and diplomacy in resolving the West Asia crisis. India has consistently advocated for de-escalation and the restoration of peace and stability in the region. A key concern for India is ensuring safe and free navigation through the Strait of Hormuz, given its significant reliance on Middle Eastern oil supplies.

Potential UN Resolution: What Could It Entail?

While details remain scarce, a UN resolution could authorize a multinational naval force to patrol the Strait of Hormuz and protect commercial shipping. This would require the cooperation of key regional and international players, including the United States, European nations, and Gulf states. Still, securing consensus within the UN Security Council could prove challenging.

Macron acknowledged the complexities of the initiative, stating that its success is not solely dependent on France. He emphasized the need for a collaborative approach and a willingness from all parties to engage in constructive dialogue.

Impact on Global Energy Markets

The disruption to oil supplies through the Strait of Hormuz has already contributed to rising global energy prices. Further escalation could lead to significant economic consequences, impacting businesses and consumers worldwide. A stable and secure Strait of Hormuz is therefore crucial for maintaining global economic stability.

Frequently Asked Questions

Q: Why is the Strait of Hormuz so important?
A: It’s a critical waterway for global oil supplies, carrying roughly 20% of the world’s oil.

Q: What is France proposing?
A: France is seeking a UN resolution to establish a framework for securing the Strait of Hormuz.

Q: What is India’s position on this issue?
A: India supports dialogue and diplomacy to de-escalate tensions and ensure safe navigation through the strait.

Q: What could a UN resolution look like?
A: It could authorize a multinational naval force to patrol the strait and protect commercial shipping.

Q: Is there a risk of further escalation?
A: Yes, continued disruptions could lead to higher energy prices and broader economic consequences.

Did you know? The Strait of Hormuz is only 21 miles wide at its narrowest point, making it a strategically vulnerable chokepoint.

Pro Tip: Stay informed about geopolitical developments in the Middle East, as they can significantly impact global markets and energy prices.

Aim for to learn more about international trade routes and their impact on the global economy? Explore our articles on global supply chains.

Share your thoughts on this developing situation in the comments below!

March 20, 2026 0 comments
0 FacebookTwitterPinterestEmail
Tech

Iran Cyberattack: Stryker Breach Signals Escalation of Retaliatory Hacks

by Chief Editor March 12, 2026
written by Chief Editor

Iran’s Cyber Retaliation: A New Era of Digital Warfare?

The recent cyberattack on medical technology firm Stryker, allegedly carried out by the Iran-linked hacking group Handala, marks a significant escalation in the ongoing conflict between the United States and Iran. This attack, which reportedly disabled tens of thousands of computers, isn’t an isolated incident, but a harbinger of a potentially new and dangerous phase of warfare – one fought increasingly in the digital realm.

From Hacktivism to State-Sponsored Chaos

For some time, Handala operated with limited notoriety. However, cybersecurity experts now believe the group functions as a front for Iran’s Ministry of Intelligence (MOIS). This evolution highlights a broader trend: Iranian state-sponsored hacking agencies increasingly cloaking themselves as hacktivists to inflict disruption and sow chaos. Previously, Handala engaged in data-destroying and hack-and-leak operations targeting entities like the Albanian government and Israeli businesses.

The Stryker Attack: A Turning Point?

The attack on Stryker is notable for its scale and target. Unlike previous operations, this breach directly impacted a critical infrastructure provider in the United States. Sergey Shykevich of Check Point emphasizes that Iranian hackers are now “all in,” utilizing every available tool and foothold to retaliate against the US and Israel. Handala has become “probably the most dominant group” in this effort, acting as “the main face” of Iran’s cyber offensive.

Beyond Retaliation: The Strategic Implications

While the immediate impetus for these attacks is retaliation for US and Israeli actions – including a missile strike that reportedly killed over 165 civilians at a school in Iran – the long-term implications are far-reaching. The attacks demonstrate a willingness to target Western interests and a growing sophistication in Iranian cyber capabilities. Experts suggest that the current campaign may be less about a meticulously planned strategy and more about seizing “targets of opportunity” to demonstrate a retaliatory effect.

The Expanding Landscape of Iranian Cyber Activity

Iran has a documented history of cyber warfare, as evidenced by numerous hacking operations. The recent escalation suggests a shift towards more destructive activity. This includes not only data breaches and system disruptions but similarly potential attacks on critical infrastructure, such as energy grids, financial institutions, and healthcare systems. The targeting of Stryker, a medical technology company, underscores the vulnerability of these essential services.

Did you understand? The Handala character, from which the hacking group takes its name, is a symbol of Palestinian resistance in political cartoons.

Future Trends in Cyber Warfare

Several trends are likely to shape the future of cyber warfare involving Iran:

  • Increased Frequency and Sophistication: Expect a continued rise in the frequency and sophistication of Iranian cyberattacks, particularly in response to perceived provocations.
  • Targeting of Critical Infrastructure: Critical infrastructure will remain a primary target, as disrupting essential services can inflict significant economic and social damage.
  • Blurring Lines Between State and Non-State Actors: The use of proxy groups and hacktivist fronts will likely continue, making attribution and response more challenging.
  • Expansion of Attack Vectors: Iranian hackers will likely explore new attack vectors, including supply chain attacks and the exploitation of zero-day vulnerabilities.
  • AI-Powered Cyberattacks: The integration of artificial intelligence (AI) into cyberattacks could lead to more automated, targeted, and evasive threats.

What Can Organizations Do to Protect Themselves?

Organizations, particularly those in critical infrastructure sectors, must prioritize cybersecurity and implement robust defenses. This includes:

  • Enhanced Threat Intelligence: Staying informed about the latest threats and vulnerabilities is crucial.
  • Stronger Access Controls: Implementing multi-factor authentication and least privilege access can limit the impact of breaches.
  • Regular Security Audits and Penetration Testing: Identifying and addressing vulnerabilities proactively is essential.
  • Incident Response Planning: Having a well-defined incident response plan can minimize damage and recovery time.
  • Employee Training: Educating employees about phishing and other social engineering tactics can reduce the risk of successful attacks.

Pro Tip: Regularly back up your data and store it offline to protect against ransomware and data loss.

FAQ

Q: What is Handala?
A: Handala is an Iranian-linked hacking group believed to be a front for Iran’s Ministry of Intelligence.

Q: Why was Stryker targeted?
A: The attack on Stryker was reportedly in retaliation for US and Israeli actions in Iran.

Q: Is critical infrastructure at risk?
A: Yes, critical infrastructure is a primary target for Iranian cyberattacks.

Q: What can organizations do to protect themselves?
A: Organizations should prioritize cybersecurity, implement robust defenses, and stay informed about the latest threats.

This evolving cyber landscape demands vigilance and proactive security measures. The attack on Stryker serves as a stark reminder that the digital battlefield is expanding, and the consequences of cyber warfare are becoming increasingly severe.

Explore further: Read more about the increasing threats to critical infrastructure on the CISA website.

March 12, 2026 0 comments
0 FacebookTwitterPinterestEmail
Tech

Meta Fights Back: New Protections Target Global Scam Surge & ‘Pig Butchering’

by Chief Editor March 11, 2026
written by Chief Editor

The Escalating War Against Online Scams: Meta’s Fight and What Lies Ahead

The digital landscape is increasingly plagued by sophisticated, large-scale scams, often originating from Southeast Asia. Recent collaborative efforts between global law enforcement, including the FBI and Thai police, and Meta have resulted in significant disruptions – 21 arrests and the disabling of 150,000 accounts – but experts warn this is just the beginning. The fight against these “pig butchering” and other investment scams is evolving, demanding constant innovation, and cooperation.

The Rise of Industrialized Scamming

What was once a fragmented issue has morphed into an industrialized operation. Scammers are leveraging social media and communication platforms like Facebook, Instagram, and WhatsApp to target victims worldwide. These aren’t isolated incidents; they are coordinated efforts run by transnational syndicates, exploiting digital platforms to operate across multiple jurisdictions. The scale is staggering, with billions of dollars lost annually.

These scams often involve building trust with victims over extended periods, a tactic known as “pig butchering,” before ultimately defrauding them of significant sums. The professionalization of these operations is a key concern, with scammers increasingly using sophisticated techniques to evade detection.

Meta’s Response: A Multi-Pronged Approach

Meta is responding with a multi-pronged strategy. In 2025 alone, the company removed 10.9 million Facebook and Instagram accounts linked to criminal scam centers and over 159 million scam ads. They are likewise expanding scam detection features within Messenger, introducing warnings for new WhatsApp device links, and testing alerts for suspicious friend requests on Facebook.

Beyond reactive measures, Meta is focusing on preventative steps. They aim to have 90% of ad revenue come from verified advertisers by the end of 2026, a substantial increase from the current 70%. This verification process is intended to reduce the influx of fraudulent advertisements. AI-powered detection systems are being deployed to identify and flag impersonation attempts and deceptive links.

Did you know? Internal Meta estimates, reported by Reuters, suggest that up to 10% of its revenue could potentially originate from scam advertising, highlighting the financial incentive for scammers to exploit the platform.

The Challenges Ahead: A Shifting Battlefield

Despite these efforts, the battle is far from won. The scamming ecosystem is constantly adapting. Scammers are becoming more adept at circumventing detection systems and exploiting new vulnerabilities. The problem is too large for any single entity to solve, requiring sustained collaboration between tech companies, law enforcement agencies, and governments worldwide.

One emerging trend is the increasing use of AI by scammers themselves. AI can be used to generate more convincing fake profiles, craft personalized scam messages, and automate various aspects of the scamming process. This creates a dangerous arms race, where detection and prevention technologies must constantly evolve to stay ahead.

Beyond Tech: Addressing the Root Causes

While technological solutions are crucial, addressing the root causes of these scams is equally important. Many scammers are victims of human trafficking and forced labor, operating under duress in scam compounds. Recent law enforcement operations in countries like Thailand, Cambodia, and Nigeria have focused on dismantling these compounds and rescuing victims.

Pro Tip: Be wary of unsolicited messages or friend requests from individuals you don’t know, especially on social media. Verify the identity of anyone you interact with online before sharing personal information or sending money.

The Future of Scam Prevention

The future of scam prevention will likely involve a combination of advanced technologies, stronger international cooperation, and increased public awareness. Expect to see:

  • Enhanced AI-powered detection: More sophisticated AI algorithms capable of identifying subtle patterns and anomalies indicative of scam activity.
  • Decentralized verification systems: Blockchain-based solutions for verifying identities and credentials, reducing the risk of impersonation.
  • Cross-platform collaboration: Increased information sharing and coordinated action between different social media platforms and communication providers.
  • Greater regulatory oversight: Governments implementing stricter regulations to hold platforms accountable for the scams that occur on their services.

FAQ: Online Scams and Your Safety

  • What is “pig butchering”? It’s a type of investment scam where fraudsters build a relationship with victims over time before convincing them to invest in fake opportunities.
  • How can I protect myself from online scams? Be cautious of unsolicited messages, verify identities, and never share personal financial information with strangers online.
  • What should I do if I reckon I’ve been scammed? Report the incident to your local law enforcement agency and the platform where the scam occurred.

The fight against online scams is a continuous process. Staying informed, exercising caution, and supporting collaborative efforts are essential to protecting yourself and others from these increasingly sophisticated threats.

What are your thoughts on the evolving threat of online scams? Share your experiences and insights in the comments below!

March 11, 2026 0 comments
0 FacebookTwitterPinterestEmail
News

Marcos renews pitch for UN Security Council seat in talks with Guterres during US visit

by Rachel Morgan News Editor March 10, 2026
written by Rachel Morgan News Editor

MANILA, Philippines — President Ferdinand Marcos Jr. Met with United Nations (UN) Secretary-General António Guterres on Monday to discuss a range of issues, including the Philippines’ pursuit of a non-permanent seat on the UN Security Council, according to Malacañang.

Philippine-UN Partnership Reaffirmed

The bilateral meeting took place at UN headquarters in New York City while President Marcos was on a working visit to the United States. The Presidential Communications Office (PCO) stated that the meeting served to reaffirm the “long-standing partnership between the Philippines and the global body.”

Did You Understand? President Marcos was accompanied by Foreign Affairs Secretary Ma. Theresa Lazaro, Philippine Permanent Representative to the UN in New York Ambassador Enrique Manalo, Philippine Ambassador to the United States Jose Manuel Romualdez, and Acting Presidential Communications Secretary Dave Gomez.

The PCO further indicated that the Philippines’ candidacy for a seat on the UN Security Council is viewed as a continuation of this established partnership. A decision on the seat will be made on June 3, 2026.

Expert Insight: Seeking a non-permanent seat on the UN Security Council represents a significant diplomatic undertaking for any nation. It allows a country to contribute to international peace and security discussions, and potentially shape global responses to critical challenges.

What Happens Next?

Should the Philippines secure a non-permanent seat, it could provide a platform to address concerns related to regional security. However, a successful bid is not guaranteed, as elections will be held on June 3, 2026. The outcome will depend on securing support from other UN member states. The Philippines will continue to advocate for its candidacy in the coming months.

Frequently Asked Questions

What was the primary purpose of the meeting between President Marcos and UN Secretary-General Guterres?

The primary purpose of the meeting was to reaffirm the partnership between the Philippines and the United Nations, and to discuss the Philippines’ bid for a non-permanent seat on the UN Security Council.

Where did the meeting between President Marcos and Secretary-General Guterres accept place?

The meeting took place at the UN headquarters in New York City.

Who accompanied President Marcos to the meeting?

Foreign Affairs Secretary Ma. Theresa Lazaro, Philippine Permanent Representative to the UN in New York Ambassador Enrique Manalo, Philippine Ambassador to the United States Jose Manuel Romualdez, and Acting Presidential Communications Secretary Dave Gomez accompanied President Marcos.

As the Philippines continues to engage with the international community, how might its role in multilateral organizations like the UN evolve?

March 10, 2026 0 comments
0 FacebookTwitterPinterestEmail
Tech

Area Man Accidentally Hacks 6,700 Camera-Enabled Robot Vacuums

by Chief Editor February 28, 2026
written by Chief Editor

Data Breaches Cost Consumers Billions: A Growing Crisis

American consumers have lost over $20 billion due to identity theft stemming from breaches at just four major data broker firms, a recent report from Congress’s Joint Economic Committee revealed. The investigation, spurred by reporting from The Markup and CalMatters, highlights the significant financial toll exacted by these often-overlooked companies.

The Hidden World of Data Brokers

Data brokers collect and sell personal information, operating with limited transparency. This lack of visibility makes it difficult for individuals to understand what data is being collected and how it’s being used, ultimately increasing their vulnerability to scams and identity theft. The recent congressional report directly followed up on investigations that showed some data brokers were actively hiding the pages where individuals can request data deletion, further hindering consumer control.

Senator Hassan Leads the Charge

Senator Maggie Hassan, ranking member of the Joint Economic Committee, initiated the investigation last July as part of a broader examination of financial scams. Following initial reporting, Senator Hassan pressed data brokers to explain their practices, leading to changes in how some companies handle consumer data requests. Still, the scale of the financial damage already inflicted is substantial.

Beyond Financial Loss: Privacy Concerns Escalate

The risks extend beyond direct financial losses. Emerging technologies are amplifying privacy concerns. A new Android app, Nearby Glasses, can detect smart glasses in the vicinity, raising alarms about surreptitious recording. This follows reports of smart glasses being used for potentially invasive surveillance, including instances involving law enforcement and unauthorized filming in private settings.

AI and the Future of Surveillance

The intersection of artificial intelligence and surveillance is creating new challenges. Anthropic, an AI company, is facing scrutiny over potential contracts with the Department of Defense that could enable the leverage of its models for autonomous weapons and mass surveillance. This has sparked internal dissent, with employees signing open letters protesting such applications. Meanwhile, research indicates that AI models, when placed in simulated war game scenarios, frequently opt for the deployment of tactical nuclear weapons.

The Vulnerability of Everyday Devices

Even seemingly innocuous devices pose security risks. A security researcher discovered a vulnerability in a robotic vacuum cleaner that allowed him to remotely access and control thousands of devices worldwide, including live video and audio feeds. This incident underscores the potential for widespread privacy breaches through insecure Internet of Things (IoT) gadgets.

CISA Under Pressure

Protecting against these threats requires a robust cybersecurity infrastructure. However, the Cybersecurity and Infrastructure Security Agency (CISA), the nation’s primary cyber defender, has faced significant challenges, including staffing cuts and political interference. Recent leadership changes within CISA raise further questions about its ability to effectively address the growing cyber threat landscape.

FAQ

  • What are data brokers? Data brokers are companies that collect personal information about individuals and sell it to other organizations.
  • How much money have consumers lost due to data breaches? Over $20 billion has been lost due to identity theft linked to breaches at four major data broker firms.
  • What is Senator Hassan’s role in this issue? Senator Hassan is the ranking member of the Joint Economic Committee and launched an investigation into financial scams, including those involving data brokers.
  • What are the privacy concerns surrounding smart glasses? Smart glasses can record audio and video without a person’s knowledge, raising concerns about surreptitious surveillance.

Pro Tip: Regularly check your credit report and consider using a credit monitoring service to detect potential identity theft.

Stay informed about your data privacy rights and take proactive steps to protect your personal information. Explore resources from organizations like The Markup and CalMatters to learn more about data brokers and how to control your data.

February 28, 2026 0 comments
0 FacebookTwitterPinterestEmail
Tech

Iran’s Internet Came Back—But Not for Everyone

by Chief Editor February 28, 2026
written by Chief Editor

Iran’s “Privileged Internet”: A Glimpse into the Future of State-Controlled Connectivity

The recent internet shutdown in Iran, beginning December 28th and escalating on January 8th, 2026, isn’t simply a temporary disruption. It represents a significant shift towards a model of highly controlled connectivity, characterized by “whitelisting” and tiered access. While connectivity has technically been restored, according to Project Ainita, the reality on the ground is far from normal. This raises critical questions about the future of internet freedom and access, not just in Iran, but globally.

The Rise of the “Whitelist” Model

Traditionally, internet censorship involved blocking specific websites and applications, requiring users to employ VPNs to circumvent restrictions. Iran is now pioneering a reversed approach. Instead of blocking a few, the regime is allowing a extremely limited number of services – primarily those used by government offices, like Gmail, Outlook, Google Meet, and LinkedIn – while blocking everything else by default. This “whitelist” model fundamentally alters the user experience.

“Even before January 8th in Iran, we already had a list of websites and apps that were blocked — and people knew they needed a VPN to access those specific platforms. But now the situation feels almost reversed,” explains Keshavarznia of Project Ainita. Most international services are now effectively restricted.

VPNs Under Pressure: A Cat-and-Mouse Game

While VPNs remain a primary workaround for many Iranians, their effectiveness is diminishing. Access to VPNs themselves is being actively restricted through technical measures, and reduced internet bandwidth makes maintaining a stable connection increasingly tricky. Users are constantly switching servers, simply to access news or communicate.

As one Iranian, Ali, stated, “The internet in Iran is never really free.”

A Two-Tiered System: “Privileged Access” for the Elite

The shutdown has also revealed a growing trend towards tiered internet access. The government is granting “special access” to select institutions – pro-government media, research centers, universities, and certain businesses – effectively creating a “privileged internet” for those aligned with the regime. This preferential treatment exacerbates existing inequalities and further isolates the broader population.

The economic impact of the shutdown is substantial. Iran’s Minister of Communications, Sattar Hashemi, estimates daily losses at around $35 million (5 trillion tomans). This economic pressure is seemingly driving the selective restoration of access for key sectors.

Beyond Iran: Global Implications for Internet Freedom

Iran’s experimentation with these control mechanisms offers a chilling preview of potential future trends in internet governance. The sophistication of the shutdown, as noted by IODA, demonstrates a developing capability to control information flow. The whitelisting approach, combined with VPN restrictions and tiered access, represents a more comprehensive and insidious form of censorship than simple website blocking.

The situation highlights the importance of building resilient, decentralized internet infrastructure. As an engineer from Project Ainita notes, “One can’t really break isolation for everybody, but we should be working now to spread decentralized tools, invest in readiness, and coordinate as a community.”

What is Active Probing and Why Does it Matter?

Organizations like IODA use Active Probing to measure internet connectivity. This involves continuously pinging devices across the globe and recording responses. A lack of response indicates a network is disconnected, providing valuable data on the scope and severity of internet disruptions. This method is crucial because it measures connectivity to the global internet, rather than just the domestic National Information Network (NIN).

FAQ: Iran’s Internet Shutdown

  • What is a VPN? A Virtual Private Network encrypts your internet traffic and routes it through a server in another location, masking your IP address and allowing you to bypass censorship.
  • What is the National Information Network (NIN)? The NIN is Iran’s domestically controlled internet network, separate from the global internet.
  • How effective are VPNs in Iran? While still used, VPN access is becoming increasingly restricted, and reduced bandwidth impacts their performance.
  • What is “whitelisting”? It’s a system where only pre-approved websites and applications are allowed to function, blocking everything else by default.

Pro Tip: Supporting organizations like Project Ainita is crucial for developing and distributing tools that help circumvent censorship and protect online freedom.

Did you know? Even with connectivity restored, measurements indicate that traffic is still only around 58 percent of pre-shutdown levels, suggesting many users still lack reliable access.

Want to learn more about internet shutdowns and digital freedom? Explore the resources available at Project Ainita’s research and IODA’s reports on internet connectivity.

Share your thoughts on the future of internet freedom in the comments below!

February 28, 2026 0 comments
0 FacebookTwitterPinterestEmail
Health

Password Managers: Security Flaws Found in LastPass, Bitwarden & Dashlane

by Chief Editor February 27, 2026
written by Chief Editor

Password Managers: A False Sense of Security? Major Vulnerabilities Exposed

For the average internet user juggling dozens of online accounts, password managers have become indispensable. But a recent study reveals a troubling truth: these tools, often touted for their “zero-knowledge encryption,” are far from foolproof. Researchers have uncovered significant security flaws in leading cloud-based password managers, potentially exposing millions of users to risk.

The Illusion of “Zero-Knowledge” Encryption

Password managers promise a simple solution to a complex problem. With a single master password, users can access all their login credentials, eliminating the need to remember countless unique passwords. Cloud-based options add the convenience of syncing across devices and sharing with family members. However, the core security promise – that even the service provider cannot access your encrypted data – is now under scrutiny.

“The promise is that even if someone is able to access the server, this does not pose a security risk to customers because the data is encrypted and therefore unreadable. We have now shown that this is not the case,” explains Matilda Backendal, one of the researchers involved in the study.

What the Research Revealed

A team from ETH Zurich and the Università della Svizzera italiana conducted a detailed analysis of Bitwarden, LastPass, and Dashlane – password managers collectively serving around 60 million users, representing a 23% market share. They developed 27 successful attack scenarios, demonstrating vulnerabilities ranging from minor integrity violations to full vault compromise.

Researchers simulated a hacked server scenario, assuming malicious control and the ability to deviate from expected behavior. They found they could gain access to, and even modify, passwords through routine interactions like logging in, opening the vault, or synchronizing data. Bitwarden faced 12 attack scenarios, LastPass 7, and Dashlane 6.

A Complex Codebase and User Convenience

The vulnerabilities aren’t necessarily the result of malicious intent, but rather the complexity of the code. Researchers found that password managers often prioritize user-friendliness – features like password recovery and account sharing – at the expense of security. This leads to a more convoluted codebase and an expanded “attack surface” for hackers.

“the code becomes more complex and confusing, and it expands the potential attack surface for hackers,” explains Matteo Scarlata, a PhD student involved in the research. “Such attacks do not require particularly powerful computers or servers—just little programs capable of impersonating the server.”

Past Warnings and Slow Remediation

This isn’t the first time password managers have faced security concerns. In August 2025, a researcher demonstrated a clickjacking attack capable of stealing passwords and financial details from several major providers. Even as some companies patched the vulnerability quickly, others, including LastPass and LogMeOnce, were slow to respond.

The current research team followed a coordinated 90-day disclosure process, notifying the affected providers before publishing their findings. While most were cooperative, the speed of remediation varied.

What Does This Imply for Users?

The findings raise serious questions about the trustworthiness of cloud-based password managers. While complete abandonment isn’t necessarily the answer, users should be aware of the risks and take steps to mitigate them.

Researchers suggest choosing password managers that are transparent about security vulnerabilities, undergo regular external audits, and have finish-to-end encryption enabled by default. They likewise recommend that providers prioritize security over convenience and avoid relying on outdated cryptographic technologies.

Pro Tip:

Consider using a hardware security key in addition to a strong master password for an extra layer of protection.

FAQ

  • Are password managers still useful? Yes, but users should be aware of the risks and choose providers carefully.
  • What is “zero-knowledge encryption”? It’s a security model where the service provider has no access to the user’s encrypted data.
  • What can I do to protect my passwords? Choose a reputable password manager, use a strong master password, and consider a hardware security key.
  • How quickly are password managers fixing these vulnerabilities? Remediation is underway, but the speed varies between providers.

Source: ETH Zurich

Do you use a password manager? Share your thoughts and concerns in the comments below!

February 27, 2026 0 comments
0 FacebookTwitterPinterestEmail
Business

Someone Remotely Accessed the Cameras in 7,000 DJI Robot Vacuums

by Chief Editor February 25, 2026
written by Chief Editor

The Romo Hack: A Wake-Up Call for the Age of Connected Homes

A software engineer’s playful attempt to control his new DJI Romo robot vacuum with a PlayStation 5 controller exposed a startling security flaw, granting him access to the cameras and floor plans of over 7,000 homes worldwide. This incident, reported by The Verge, isn’t just a quirky tech story; it’s a stark warning about the vulnerabilities inherent in our increasingly connected lives.

From Gaming to Global Access: How the Hack Unfolded

Sammy Azdoufal, the engineer behind the exploit, wasn’t intentionally trying to breach anyone’s privacy. He simply wanted to use his preferred controller with his new robot vacuum. Using AI-assisted reverse-engineering, he created an app that connected to DJI’s servers. Instead of being limited to his own device, the app unexpectedly unlocked access to a vast network of Romo vacuums. He could view live video feeds, listen to audio, and even map out the interiors of people’s homes.

“I didn’t infringe any rules, I didn’t bypass, I didn’t crack, brute force, whatever,” Azdoufal told The Verge, emphasizing that he hadn’t actively sought to exploit the system. The issue stemmed from a private token associated with his own Romo, which, for reasons yet fully understood, granted him widespread access.

The Expanding Attack Surface of the Smart Home

The Romo hack highlights a growing concern: the expanding attack surface of the smart home. As we integrate more devices – from robot vacuums and security cameras to smart thermostats and voice assistants – into our daily lives, we create more potential entry points for malicious actors. Each connected device represents a potential vulnerability.

DJI, leveraging its drone technology in the Romo, including obstacle-detection imaging and binocular fisheye vision sensors, inadvertently created a device with significant data-gathering capabilities. While these features enhance functionality, they as well raise privacy concerns when security measures are inadequate.

Beyond the Romo: A Pattern of Vulnerabilities

This isn’t an isolated incident. Recent reports demonstrate that security vulnerabilities are a recurring problem in home technology. The potential for misuse is significant, as demonstrated by previous cases of hacked devices being used for malicious purposes.

As The Verge rightly points out, users reasonably expect that data collected by in-home devices will be protected. The Romo incident underscores the critical need for manufacturers to prioritize security from the outset, rather than treating it as an afterthought.

What’s Being Done – and What Needs to Happen

DJI claims to have addressed the vulnerabilities identified by Azdoufal, releasing updates to resolve the issue. Though, the initial response proved insufficient, as a live demo showed the flaws remained exploitable. This raises questions about the thoroughness of security testing and the speed of response to reported vulnerabilities.

The incident also highlights the importance of responsible disclosure. Azdoufal’s decision to function with The Verge and DJI to address the issue responsibly prevented potential widespread harm.

The Future of Smart Home Security: A Multi-Layered Approach

Securing the smart home requires a multi-layered approach involving manufacturers, consumers, and regulators. Here are some key areas for improvement:

  • Secure-by-Design Principles: Manufacturers must prioritize security throughout the entire product development lifecycle, from initial design to ongoing maintenance.
  • Robust Authentication: Stronger authentication mechanisms are needed to prevent unauthorized access to devices and data.
  • Regular Security Updates: Devices must receive regular security updates to address newly discovered vulnerabilities.
  • Data Encryption: Data transmitted between devices and servers should be encrypted to protect it from interception.
  • Consumer Awareness: Consumers need to be educated about the security risks associated with smart home devices and how to mitigate them.

FAQ

Q: What is a “private token” and how did it cause this issue?
A: A private token is a unique identifier used to authenticate a device with a server. In this case, Azdoufal’s token inadvertently granted him access to a much wider network than intended.

Q: Is my DJI Romo vacuum currently vulnerable?
A: DJI claims to have released updates to address the vulnerabilities. Ensure your device is running the latest firmware.

Q: What can I do to protect my smart home devices?
A: Change default passwords, enable two-factor authentication where available, and keep your devices updated with the latest security patches.

Q: What role did AI play in this incident?
A: AI, specifically Claude Code, was used to reverse engineer the communication protocol of the Romo, which ultimately led to the discovery of the vulnerability.

Did you know? The Romo leverages DJI’s extensive drone technology, including sophisticated imaging systems, making it a powerful data-gathering device.

Pro Tip: Regularly review the privacy settings of your smart home devices and limit the amount of data they collect.

The Romo hack serves as a critical reminder that convenience and connectivity must not come at the expense of security and privacy. As we continue to embrace the smart home revolution, we must demand greater accountability from manufacturers and prioritize the protection of our personal data.

What are your thoughts on smart home security? Share your concerns and suggestions in the comments below!

February 25, 2026 0 comments
0 FacebookTwitterPinterestEmail
Newer Posts
Older Posts

Recent Posts

  • Sharjah: Missile Attack on Thuraya Communications Building – 2 Injured

    April 8, 2026
  • PSV Apologizes for Player’s Offensive Song During Championship Celebration

    April 8, 2026
  • Indosat & Google: Access Gemini AI Plus with IM3 & Tri Data Packages

    April 8, 2026
  • HIV Testing Cuts May Raise Infections by 10%

    April 8, 2026
  • Amsterdam Dating Scam: Man Arrested After Robbery & Assaults

    April 8, 2026

Popular Posts

  • 1

    Maya Jama flaunts her taut midriff in a white crop top and denim jeans during holiday as she shares New York pub crawl story

    April 5, 2025
  • 2

    Saar-Unternehmen hoffen auf tiefgreifende Reformen

    March 26, 2025
  • 3

    Marta Daddato: vita e racconti tra YouTube e podcast

    April 7, 2025
  • 4

    Unlocking Success: Why the FPÖ Could Outperform Projections and Transform Austria’s Political Landscape

    April 26, 2025
  • 5

    Mecimapro Apologizes for DAY6 Concert Chaos: Understanding the Controversy

    May 6, 2025

Follow Me

Follow Me
  • Cookie Policy
  • CORRECTIONS POLICY
  • PRIVACY POLICY
  • TERMS OF SERVICE

Hosted by Byohosting – Most Recommended Web Hosting – for complains, abuse, advertising contact: o f f i c e @byohosting.com


Back To Top
Newsy Today
  • Business
  • Entertainment
  • Health
  • News
  • Sport
  • Tech
  • World