UK Tech Jobs Soar, but London's AI Dominance Highlights Regional Divide

2025-06-06
UK Tech Jobs Soar, but London's AI Dominance Highlights Regional Divide

Accenture research reveals a 21 percent surge in UK tech vacancies, reaching pre-pandemic highs. AI job postings nearly doubled year-over-year, with London accounting for 80 percent. While the UK saw a 53 percent increase in individuals reporting tech skills (1.69 million), a significant regional disparity exists. London-based companies plan to allocate 20 percent of their tech budgets to AI, compared to just 13 percent in regions like North East England, Scotland, and Wales. This highlights the UK's AI opportunity alongside a concerning digital divide, threatening long-term competitiveness unless regional talent and infrastructure gaps are addressed.

Read more

KDE Welcomes Windows 10 Exiles: Embrace the Linux Plasma Desktop

2025-06-04
KDE Welcomes Windows 10 Exiles: Embrace the Linux Plasma Desktop

With Microsoft ending support for many Windows 10 versions on October 14th, KDE launched a campaign, "KDE for Windows 10 Exiles," inviting users to switch to the Linux Plasma desktop. KDE highlights security risks and functional decline for Windows 10 PCs after support ends. While migration to Linux presents challenges, KDE emphasizes Plasma's user-friendliness and offers a more secure, update-free experience. The article also notes that Windows 10 PCs won't immediately stop working after support ends, and users have options, but KDE's campaign underscores Linux as a viable alternative for Windows 10 users.

Read more
Tech

Cybercriminals Use Modified Salesforce Data Loader for Data Theft

2025-06-04
Cybercriminals Use Modified Salesforce Data Loader for Data Theft

The Google Threat Intelligence Group (GTIG) has uncovered a cybercriminal group, tracked as UNC6040, that uses sophisticated voice phishing to trick employees into installing a modified Salesforce Data Loader. This allows them to steal large amounts of sensitive data from approximately 20 organizations across various sectors in the Americas and Europe. The attackers convincingly impersonate IT support, guiding victims through the connection process to link the malicious Data Loader. Following data exfiltration from Salesforce, UNC6040 often laterally moves through the network, accessing and stealing data from other platforms like Okta, Workplace, and Microsoft 365. In some cases, extortion attempts followed months later, suggesting potential partnerships with other threat actors. Salesforce has issued guidance to help customers protect themselves against similar attacks.

Read more
Tech

Musk's XChat: Encryption Promises vs. Reality

2025-06-04
Musk's XChat: Encryption Promises vs. Reality

Elon Musk announced X's new direct messaging feature, "XChat," boasting a "whole new architecture" and "Bitcoin-style encryption." However, this claim has drawn skepticism from encryption experts. Musk provided few details about the encryption method, and X's help page admits vulnerability to man-in-the-middle attacks and implies the platform could access messages due to legal processes. Unlike Signal and WhatsApp's end-to-end encryption, XChat's encryption remains unclear, raising concerns about its security. Matthew Hodgson, CEO of encrypted messaging app Element, criticized XChat's lack of technical transparency and open-source nature, questioning its safety.

Read more
Tech

Indian Grocery App KiranaPro Hit by Deliberate Cyberattack, GitHub and AWS Resources Wiped

2025-06-04
Indian Grocery App KiranaPro Hit by Deliberate Cyberattack, GitHub and AWS Resources Wiped

Indian grocery ordering app KiranaPro suffered a deliberate cyberattack that wiped its GitHub repository and AWS resources. CEO Deepak Ravindran claims it was a targeted attack, possibly by a disgruntled insider. The attack crippled the app, impacting thousands of Kirana store owners whose livelihoods depend on it. Ravindran is rebuilding systems with enhanced security and promises to reveal the hacker's identity. The incident highlights the dangers of insider threats and the importance of robust security practices, such as regular backups and multi-factor authentication.

Read more

Meta and Yandex Caught Bypassing Privacy Protections with Localhost Tracking

2025-06-04
Meta and Yandex Caught Bypassing Privacy Protections with Localhost Tracking

Security researchers revealed that Meta and Yandex used native Android apps to listen on localhost ports, linking web browsing data to user identities and bypassing typical privacy safeguards. Meta's Pixel script has stopped sending data to localhost and removed much of the tracking code, likely to avoid violating Google Play policies. Researchers discovered that Facebook, Instagram, and Yandex apps silently collected cookie data via fixed local ports, linking browsing activity to user identities and circumventing cookie clearing, incognito mode, and app permission systems. Meta employed this technique starting in September 2024, using HTTP, WebSocket, and WebRTC protocols. Meta has since ceased this practice, but Yandex's use continues. Chrome 137 includes some mitigations, and Firefox and DuckDuckGo are also taking action.

Read more

AWS Launches European Sovereign Cloud Amidst Data Sovereignty Concerns

2025-06-03
AWS Launches European Sovereign Cloud Amidst Data Sovereignty Concerns

Responding to growing European distrust of American hyperscalers, Amazon Web Services (AWS) announced a new European organization boasting strong technical controls, sovereign assurances, and legal protections. This move addresses rising data sovereignty concerns fueled by US government policies and actions, leading European businesses to question storing data with US tech giants. The new European Sovereign Cloud will feature a locally controlled parent company and three German subsidiaries, along with an independent advisory board and security operations center to ensure data security and sovereignty. However, despite these measures, AWS remains subject to US law, potentially limiting its ability to fully protect customer data from government access.

Read more
Tech

VMware Axes Lowest Tier of Partner Program, Sparking Concerns

2025-06-03
VMware Axes Lowest Tier of Partner Program, Sparking Concerns

Broadcom's VMware unit is overhauling its channel partner program, eliminating the lowest tier and imposing stricter requirements on the remaining levels. This move aims to improve partner capabilities and better support customers' transition to VMware's private cloud. While VMware assures vSphere users won't be affected, analysts predict this could push partners towards competitors like Microsoft, Nutanix, and AWS, potentially leading to market share loss. Furthermore, the upcoming VMware Cloud Foundation 9 introduces new licensing demands and hardware compatibility limitations, potentially exacerbating market disruption. The changes have been described as a “pivotal moment” by VMware executives, indicating a significant shift in strategy.

Read more

Cryptojacking Campaign Targets Misconfigured DevOps Tools

2025-06-03
Cryptojacking Campaign Targets Misconfigured DevOps Tools

A new cryptojacking campaign, attributed to an attacker named JINX-0132, is exploiting misconfigurations and vulnerabilities in publicly accessible DevOps tools to steal cloud computing resources for cryptocurrency mining. The campaign primarily targets HashiCorp's Nomad and Consul, Docker API, and Gitea. Researchers estimate that up to 25% of cloud environments are vulnerable, with 5% directly exposing these tools to the internet and 30% exhibiting misconfigurations. JINX-0132 leverages these flaws for remote code execution, deploying XMRig mining software. Mitigation involves updating software, disabling script checks, restricting API access, and properly configuring security settings.

Read more

Snowflake's Growth Bottlenecked by On-Prem Renewal Cycles

2025-06-02
Snowflake's Growth Bottlenecked by On-Prem Renewal Cycles

Snowflake's growth in the large enterprise market is hampered by the renewal cycles of older, on-premises data warehouse and analytics technology, according to its VP of Finance, Jimmy Sexton. While Snowflake's Q1 revenue hit nearly $1 billion, up 26 percent year-over-year, and they secured two deals exceeding $100 million in the financial services sector, growth is constrained by the lengthy migration process from on-prem systems. Customers typically only initiate migrations near contract renewals, limiting Snowflake's ability to rapidly expand in this market segment. This reliance on renewal cycles applies to various legacy systems, not just Teradata, hindering faster adoption.

Read more
Tech

Data Sovereignty Concerns Drive UK Businesses Away from US Tech Giants

2025-06-02
Data Sovereignty Concerns Drive UK Businesses Away from US Tech Giants

Amid economic uncertainty and the Trump era, dependence on American tech is a growing concern for UK businesses. A survey of 1,000 IT leaders reveals data sovereignty as a top priority. 84% worry geopolitical events threaten data access and control, with 60% believing the UK government should stop procuring cloud services from US companies. Nearly half are considering repatriating data, fearing US government seizure. However, experts warn completely eliminating reliance on global hyperscalers is difficult, with migration proving more complex than anticipated.

Read more
Tech

Software Research: The Myth of the 100x Bug Cost and the Lack of Empirical Evidence

2025-06-01
Software Research: The Myth of the 100x Bug Cost and the Lack of Empirical Evidence

An article examining the cost of fixing software bugs debunks a long-held myth: that fixing bugs gets exponentially more expensive over time. This myth stems from a non-existent IBM study. In reality, existing research offers weak support for this claim, with some studies showing no significant difference in resolution times. The article calls for a greater emphasis on empirical software engineering research, highlighting the importance of code reviews, short iteration cycles, and feedback loops, while criticizing academia's tendency to prioritize theory over practice.

Read more
Development empiricism

Billions of Stolen Cookies Flood Dark Web Marketplaces: A Cybersecurity Threat

2025-05-31
Billions of Stolen Cookies Flood Dark Web Marketplaces:  A Cybersecurity Threat

NordVPN's research reveals over 93.7 billion stolen cookies are for sale on dark web and Telegram marketplaces, with 7-9% remaining active. These cookies may contain user IDs, names, addresses, passwords, and other sensitive data, posing a significant security risk. Attackers can use these cookies to access accounts without authorization, even bypassing multi-factor authentication (MFA). The majority stem from malware like Redline. NordVPN advises users to carefully consider cookie acceptance, regularly clear browser history, update security patches, and strengthen account privacy settings to mitigate this threat.

Read more

HP Shifts Production Away from China to Combat Tariffs

2025-05-29
HP Shifts Production Away from China to Combat Tariffs

HP Inc. is rapidly moving its North American product manufacturing out of China due to US tariffs, aiming to have almost no US-bound products coming from China by June. To mitigate tariff impacts, HP is shifting production to Southeast Asia, Mexico, and the US, and has implemented price increases. While Q2 revenue grew, profits fell short of expectations. HP anticipates a challenging second half of the year due to weakening economic conditions and consumer confidence, but sees growth in AI PCs, aiming for over 25% of its PC mix by year-end.

Read more

Microsoft Unveils Windows Update Orchestration and Enterprise Backup

2025-05-29
Microsoft Unveils Windows Update Orchestration and Enterprise Backup

Microsoft has released a private preview of a Windows 11 update orchestration platform designed to streamline app updates, providing centralized scheduling and troubleshooting. Developers can register update logic via WinRT APIs and PowerShell, supporting MSIX/APPX and Win32 apps. Concurrently, a limited public preview of Windows Backup for Organizations is available, allowing backup and restore of Windows 10 and 11 device settings, easing enterprise migrations to Windows 11 and mitigating malware threats. However, the service has specific device and environment requirements.

Read more

EU Slams SHEIN with Warning Over Deceptive Practices

2025-05-27
EU Slams SHEIN with Warning Over Deceptive Practices

The European Commission issued a warning to SHEIN, citing various violations of consumer protection laws on its website. These include fake discounts, pressure selling, misleading information, deceptive product labeling, and hidden contact details. SHEIN has one month to respond; failure to comply could result in substantial fines. This action comes as SHEIN already faces US tariffs, creating significant hurdles for its global expansion. China, which sees SHEIN as a key exporter, will likely view the EU's warning as a setback to its economic development strategy.

Read more
Startup

Cryptome Co-founder John Young Dies at 89: A Fighter for Information Freedom

2025-05-27
Cryptome Co-founder John Young Dies at 89: A Fighter for Information Freedom

John Young, co-founder of the legendary internet archive Cryptome, passed away at age 89. Cryptome, predating WikiLeaks and other similar platforms, served as a vital repository of government documents and information the public had a right to know. Young's activism, rooted in his experiences protesting the Vietnam War and racial segregation, fueled his dedication to transparency. Cryptome's history includes clashes with Microsoft and disagreements with Julian Assange over funding and philosophies. Young's death marks the end of an era, but his legacy of fighting for information freedom continues.

Read more

Java at 30: From WORA to Enterprise Backbone

2025-05-23
Java at 30: From WORA to Enterprise Backbone

Thirty years ago, Java burst onto the scene, its 'Write Once, Run Anywhere' promise offering a breath of fresh air to the development world. While the reality of 'Write Once, Test Everywhere' sometimes prevailed, Java quickly became a mainstay of enterprise applications. It weathered legal battles with Microsoft and experienced fluctuations in popularity, yet remains a top-tier language in the TIOBE index. Oracle's commercialization strategy has caused controversy, but the existence of open-source alternatives ensures Java's continued vitality, keeping it highly relevant as it enters its fourth decade.

Read more

Microsoft Adds Copilot to Notepad: A Pointless AI Integration?

2025-05-23
Microsoft Adds Copilot to Notepad: A Pointless AI Integration?

Microsoft continues to integrate AI into its built-in Windows apps, with the latest update bringing Copilot's text generation capabilities to Notepad. Users must sign in with their Microsoft account and select a location before using the Copilot 'Write' function to generate text. This addition has sparked controversy, with many questioning its necessity and finding it superfluous for a simple text editor. In contrast, AI upgrades to Paint, such as a sticker generator and smart selection tool, seem more practical. Microsoft's enthusiasm for adding AI features across its apps is evident, but the usefulness of some integrations remains questionable.

Read more
Development

Broadcom's VMware Price Hikes Spark EU Antitrust Concerns

2025-05-22
Broadcom's VMware Price Hikes Spark EU Antitrust Concerns

Broadcom's acquisition of VMware has resulted in licensing cost increases of 8 to 15 times, prompting outrage among European cloud providers. A report by the European Cloud Competition Observatory (ECCO) reveals Broadcom's termination of existing agreements, forcing customers into new subscription models with drastically inflated prices—some seeing increases exceeding tenfold. This has burdened European cloud providers financially and operationally, hindering competition and innovation. Formal antitrust complaints have been filed with the European Commission, demanding fairer VMware licensing practices from Broadcom.

Read more

US Could Lift Supersonic Flight Ban After 52 Years

2025-05-17
US Could Lift Supersonic Flight Ban After 52 Years

A bipartisan bill aims to lift the decades-long ban on supersonic flight over the continental US, contingent on eliminating ground-level sonic booms. Backed by figures like Elon Musk and with technological advancements from NASA, the bill seeks to allow a new generation of quieter supersonic jets. The legislation highlights a renewed competition with China, which is actively pursuing its own supersonic aviation goals. The history of sonic boom testing and the resulting ban are also explored, leading to renewed hope for faster air travel and American leadership in aviation.

Read more
Tech

Broadcom Data Breach After Ransomware Attack on ADP Partner

2025-05-16
Broadcom Data Breach After Ransomware Attack on ADP Partner

A ransomware attack on Business Systems House (BSH), a Middle Eastern business partner of payroll company ADP, resulted in a data breach affecting Broadcom employees. The El Dorado ransomware group claimed responsibility, publishing stolen data online. Broadcom has notified affected current and former staff, advising them to take security precautions. The incident highlights supply chain security risks and the growing threat of ransomware attacks. ADP states its systems were unaffected and assisted BSH in investigation and remediation.

Read more
Tech

NASA Revives Voyager 1's Decades-Old Thrusters in a High-Stakes Gamble

2025-05-16
NASA Revives Voyager 1's Decades-Old Thrusters in a High-Stakes Gamble

NASA engineers successfully restarted Voyager 1's primary thrusters, deemed inoperable for over two decades. The nearly 50-year-old spacecraft faced imminent failure due to clogged fuel lines in its backup thrusters. The risky maneuver involved powering up dormant heaters, with the potential for a small explosion if the heaters were still dead. The success buys Voyager 1 more time to explore interstellar space, a testament to human ingenuity and perseverance.

Read more
Tech

Trump Admin to Accept $400M Luxury Jet: A Costly Gamble?

2025-05-14
Trump Admin to Accept $400M Luxury Jet: A Costly Gamble?

The Trump administration plans to accept a $400 million luxury 747-8 from Qatar as a temporary Air Force One. However, upgrading it to presidential security standards could take years and cost hundreds of millions more. The plan raises legal and ethical concerns, as ownership will transfer to Trump's presidential library after his term. Security experts warn retrofitting a foreign-owned aircraft is extremely expensive, time-consuming, and could disrupt the already delayed Boeing replacement program. The current Air Force One boasts advanced defense and communication systems; adapting the Qatari jet would pose significant security risks and costs, making continued use of the existing planes until replacements are ready a more sensible option.

Read more

Linus Torvalds Returns to Clicky Mechanical Keyboard

2025-05-13
Linus Torvalds Returns to Clicky Mechanical Keyboard

Linus Torvalds, the creator of the Linux kernel, has returned to his trusty clicky mechanical keyboard after a six-month experiment with a quieter, low-profile alternative. He found the audible and tactile feedback crucial to reducing typing errors. Despite working from home, he initially blamed his recent typos on the keyboard (later shifting blame to autocorrect). Meanwhile, progress on the Linux 6.15 kernel release is proceeding smoothly, with a release expected in two weeks.

Read more
Development Mechanical Keyboard

Remote Work Fuels Startup Boom: An Unexpected Pandemic Side Effect?

2025-05-13
Remote Work Fuels Startup Boom: An Unexpected Pandemic Side Effect?

New research reveals companies with higher remote work rates during the COVID-19 pandemic saw a significant increase in employee-founded startups. Analyzing IP address and LinkedIn data, researchers found that at least 11.6% of the post-pandemic surge in new firm entries can be attributed to remote workers launching their own businesses. While some companies may experience losses due to employee departures, policymakers view this as a positive spillover effect, boosting job creation and innovation. However, the recent scaling back of remote work policies by major tech companies sparks debate over corporate motivations and the impact of remote work on productivity.

Read more
Startup

EU Launches Rival Vulnerability Database as US CVE Program Faces Uncertainty

2025-05-13
EU Launches Rival Vulnerability Database as US CVE Program Faces Uncertainty

Amidst US budget cuts and uncertainty surrounding its CVE program, the EU has launched its own vulnerability database, the EUVD. This streamlined platform offers real-time monitoring of critical and actively exploited vulnerabilities, providing a stark contrast to the US NVD's struggles with backlogs and navigation. The EUVD features both CVE and its own unique identifiers, prominently displaying critical and exploited vulnerabilities. This move significantly bolsters EU cybersecurity capabilities and offers a viable alternative globally.

Read more

Nextcloud Accuses Google of Deliberately Crippling its Android Files App

2025-05-13
Nextcloud Accuses Google of Deliberately Crippling its Android Files App

European software vendor Nextcloud has accused Google of deliberately crippling its Android Files application, which boasts over 800,000 users. The issue centers around the 'All files access' permission, necessary for the app's file synchronization functionality. While Google offers privacy-focused alternatives, Nextcloud argues these are insufficient. Google revoked this permission in 2024, effectively breaking the app on the Play Store. Nextcloud believes this is part of a larger pattern of anti-competitive behavior by Big Tech, citing slow-moving regulatory processes and the lack of recourse for smaller companies. The app remains functional on F-Droid.

Read more
Development Anti-competitive

UK Creative Industry Fights Back Against AI Copyright Loopholes

2025-05-12
UK Creative Industry Fights Back Against AI Copyright Loopholes

Over 400 leading UK media and arts professionals have penned a letter to the Prime Minister opposing an amendment to the Data (Use and Access) Bill. This amendment would allow AI models to use copyrighted works, causing concerns about widespread copyright infringement. While an opt-out is proposed, the group, including Paul McCartney, Elton John, Coldplay, and numerous media organizations, argues it's insufficient. They demand transparency, forcing AI companies to disclose copyrighted works used in training, protecting creators and fostering a vibrant UK creative industry. The letter highlights the economic impact and the need to prevent years of potential copyright theft.

Read more

US Copyright Chief Fired After AI Fair Use Report

2025-05-12
US Copyright Chief Fired After AI Fair Use Report

Shira Perlmutter, head of the US Copyright Office, was reportedly fired a day after the agency concluded that AI model builders' use of copyrighted material exceeded existing fair use doctrines. The report stated that AI companies cannot sustain a fair use defense under specific circumstances, putting companies like Google, Meta, OpenAI, and Microsoft at legal risk. Reasons for the firing are debated, with suggestions ranging from Perlmutter's refusal to allow Elon Musk's use of copyrighted material for AI training to a broader Trump administration policy shift on diversity. The incident escalates the AI copyright battle and sparks debate on balancing AI development with copyright protection.

Read more
Tech
1 2 3 5 7 8 9 10