Friday, June 13, 2025

Tech News, analysis, updates, comments, reviews

When Digital Companions Become Digital Dependencies

The cybersecurity community talks extensively about data breaches, malware, and system vulnerabilities. We spend countless hours protecting digital assets and user privacy. Yet something far more subtle is happening right under our noses, and it deserves our attention: the growing psychological dependency on AI chatbots and its implications for human wellbeing. Recent research from MIT Media Lab and OpenAI reveals troubling patterns among heavy chatbot users. Heavy use of ChatGPT was correlated with increased loneliness, emotional dependence, and reduced social interaction, particularly among the top 10 percent of users by time spent. While correlation does not equal causation, these findings echo patterns we have seen before with...

Lessons from Philosophy for Cybersecurity Leadership

Most security incidents trigger the same sequence: discovery, investigation, and then something more primal. The desire to strike back. It could be a data breach, a successful phishing campaign, or a ransomware attack. The emotional aftermath often overshadows the technical response. Teams want to trace the attackers, expose their methods, make them pay for the disruption they have caused. This reaction feels natural, even righteous. After all, cybercriminals are causing real harm to organizations, individuals, and entire economies. The urge to retaliate stems from a fundamental sense of justice. Yet philosopher Martha Nussbaum argues in her examination of human emotion that anger, while deeply human, becomes a...

Enjoy exclusive access to our content

Get an online subscription and you can unlock any article you come across, getting instant emails when our site updates, too.

John McAfee ‘Q’ Instagram Post Sparks Dead Man’s Switch Conspiracy

A cryptic image posted on John McAfee's Instagram moments after he was reported dead sparked speculation from QAnon conspiracy theorists that the antivirus software entrepreneur had activated a so-called "dead man's switch" to expose the government. John McAfee, 75, was found dead in a Barcelona prison cell hours after a Spanish court agreed to extradite [...]

Client-side web security

To address attacks such as XSS, Magecart and other card skimming exploits found in modern eCommerce environments, the use of client-side web security methods is beginning to emerge as a particularly useful practice. Obviously, enterprise teams should integrate client-side protections...

How To Install And Use TinyMCE – WYSIWYG HTML Editor In...

TinyMCE is also one of the popular WYSIWYG HTML editors like CKEditor. In this article, we study how to use TinyMCE in your Laravel application.

Regulation Insights from Starlink’s in Zimbabwe

In recent times, the journey of Starlink, Elon Musk's ambitious satellite internet venture under SpaceX, has been marked by regulatory challenges, particularly in Zimbabwe....

Why Cybersecurity Awareness in Corporate Spaces Matters and How to Achieve...

In today's digital age, the importance of cybersecurity can hardly be overstated. With the increasing reliance on technology and the internet, companies are more vulnerable to cyber attacks than ever before. A single security breach can result in the...

VPN limitations leave opening for ‘zero-trust’ tech

Virtual private network (VPN) usage soared in March 2020 as employers sought to connect a growing number of homebound employees to company resources. But limitations of VPNs—namely, drawbacks in security and scalability—have left an opening for a technology area known...

Enjoy exclusive access to our content

Get an online subscription and you can unlock any article you come across, getting instant emails when our site updates, too.

Worldwide news every day

Leave a minimal digital footprint

Your digital footprint paints a picture of who you are. Every day, whether we want to or not, most of us contribute to a growing...

How Kenyans (and the world) are falling for a Bitcoin Scam

Bitcoin scams seem to gain track in Kenya and globally overall. Here, Blancos explains how these scams operate, and how to really identify...

Ransomware: Now and The Future

Ransomware has staked its claim as a major element of the cybercriminal ecosystem. As one of the most potentially damaging and costly types of...

Attack Lifecycle story – part 1

I was recently explaining to a group of colleagues how a hacker gains access to a system. Then it hit me; most people are...

Read more

Get involved

Newly Revealed Security Flaw Means Malware Could Steal Data From Android Devices

A newly revealed flaw in the Android operating system could allow wrongdoers to steal private information from your device. Both the malware and the...

Become part of the community

On-Premises vs. Cloud Security

As usual, we begin by championing cybersecurity. It stands as the foremost concern for organizations striving to safeguard their sensitive data and digital assets. Among the many strategies available, two dominant paradigms have emerged: on-premises security and cloud security....

Information Security in the Time of Covid-19 – Moving to the Cloud as a Cost-Cutting Measure Does Not Lessen Compliance Obligations

Recurringly, organizations fail to ask themselves the most rudimentary questions before moving to cloud platforms, and they suffer as a result...

Microsoft: Here’s how we’re trying to manage increased cloud demand

Microsoft prioritized the needs of first responders, healthcare workers, and others on the front line, as they've noted previously. And they've throttled some less-essential services to try to keep things humming. On April 23, officials...

Launching Oracle’s COVID-19 Therapeutic app: The back story

By Tony Baer (dbInsight) for Big on Data | April 10, 2020 -- 12:00 GMT (13:00 BST) | Topic: Coronavirus: Business and technology in a pandemic The input screen that patients see when using Oracle's COVID-19 therapeutic app   Source: Oracle Among the many mysteries of the coronavirus is finding out which medications and therapies [...]
spot_img

Create a website from scratch

With our Website Development Service you can be up and running in no time and get yourself or your business visible to millions of potential clients online!

WhatsApp extends deadline for new privacy policy after people fled

WhatsApp on Friday announced that it will be extending the deadline of its confusing policy implementation by three months. The widely criticised policy required that its two billion users must either accept its updated terms and conditions by February...

What are the real intentions of tracking IMEI numbers?

Imagine if you had a magic map that could show you where all your favorite toys were at any time. Sounds pretty? Well, in Kenya, the government wants to do something similar, but with people’s phones. They plan to...

Leave a minimal digital footprint

Your digital footprint paints a picture of who you are. Every day, whether we want to or not, most of us contribute to a growing portrait of who we are online; a portrait that is probably more public than we...

A Rant: Stripping Privacy in This Era

The world has a privacy problem. Everything connected to the Internet (which is almost everything today), is for the taking. Looking around an average person's daily routine, it exposes the enlarging attack surface with each device we purchase, each...

Australia: Unprecedented surveillance bill rushed through parliament in 24 hours.

Australian police can now hack your device, collect or delete your data, take over your social media accounts - all without a judge's warrant. The Australian government has been moving towards a surveillance state for some years already. Now they are putting the nail in the coffin with an unprecedented surveillance bill that allows the [...]

Court Explains About Claim To Let Government Listen To Citizens’ Phones

The Judiciary came out to disprove a news report by Standard carried on the daily's Sunday edition that claimed that in a ruling by the Court of Appeal, the government had been given the go-ahead to tap and listen to private calls

How to Effectively Detect and Respond to a Data Breach

Prevention is key, so be sure to take steps to prevent breaches from occurring in the first place by implementing strong security measures and regularly monitoring your systems for potential threats

How Kenya’s new personal data protection law could affect researchers

The risk of infringing on privacy is growing by the day given the increased frequency and granularity of the data being collected, and advances in the technology for processing them. This has, inevitably, led to the need for laws to secure personal data privacy. Researchers and research data are not exempt: advances in big data [...]
spot_img

Create a website from scratch

With our Website Development Service you can be up and running in no time and get yourself or your business visible to millions of potential clients online!

Amazon is finally getting serious about crypto and hopes to bring it to customers ‘as soon as possible,’ as it looks to hire a...

Amazon is finally getting serious about crypto technologies like bitcoin, a move that pushes the e-commerce giant into the burgeoning yet wildly volatile digital-currency space.

Cryptojackers and hackers

What qualifies as nightmare news for many cryptocurrency owners—prices of most major tokens taking another dive into the gutter—seems to not be that big a problem for cybercriminals who hijack hardware resources to mine it on someone else’s dime. The...