Could your face change what you pay? NYC wants limits on biometric tracking
New York City lawmakers are pushing to ban private businesses from using biometric tools like voice and facial recognition software to track the public. While…
New York City lawmakers are pushing to ban private businesses from using biometric tools like voice and facial recognition software to track the public. While…
Ravie LakshmananMar 20, 2026Data Privacy / Mobile Security Google on Thursday announced a new “advanced flow” for Android sideloading that requires a mandatory 24-hour wait…
HSS ProService’s emergence as a fully digitised business has been underpinned by a marketplace system built on functional programming in Scala and Cats, plus agentic…
In this week’s cybersecurity roundup, The Cyber Express covers key global security developments, including a major supply chain disruption affecting a global manufacturer, rising concerns…
Iranian hacker group Handala Hack Team, the collective behind the famed cyberattack on U.S. MedTech firm Stryker, is back online just hours after the FBI…
A hacker says they have broken into a US platform for searching law enforcement hotline messages and compromised more than 8 million confidential tips. In…
Apple urges iPhone users to update as Coruna and DarkSword exploit kits emerge Pierluigi Paganini March 20, 2026 Apple warns that outdated iPhones are vulnerable…
Commercial spyware as an intelligence channel Criminal operators deploying Predator, a spyware suite sold by the sanctioned Intellexa consortium, have been documented across more than…
The U.S. FERC (Federal Energy Regulatory Commission) unanimously approved on Thursday a sweeping set of actions aimed at strengthening and safeguarding the reliability of the…
The National Cybersecurity Center of Excellence (NCCoE) at the National Institute of Standards and Technology (NIST) released six final publications in its Applying 5G Cybersecurity…
Sharing and reusing passwords is one of the easiest ways hackers can gain access to your online accounts. And some people aren’t making it any…
Even as cybersecurity has grown and become universially accepted, the field has continued to struggle when attempting to assess and aquire talent. Oftentimes, there is…