Saylor Digital Assets Framework, Principles, and Opportunity for the United States 1. Taxonomy: Defining Digital Asset Classes Establishing a clear, universally understood taxonomy of digital assets is critical to advancing policy and fostering innovation. 2.…
Saylor
Establishing a clear, universally understood taxonomy of digital assets is critical to advancing policy and fostering innovation.
<ul><li>Digital Commodity: An asset without an issuer, backe… [+4542 chars]
'Genius Girl' goes from inspiring a Korean TV show character to raising a $100 million AI fund | TechCrunchtechcrunch.com
On the weekend, as most students were stumbling back from the bars, Songyee Yoon was rushing across her South Korean campus. Around dinner time, she would run some programs on her colleges supercompu… [+3575 chars]
The UN Secretary-General on Thursday urged the Security Council to act decisively to establish international guardrails for artificial intelligence (AI), warning that delays could heighten risks to global peace and security.
By Vibhu Mishra19 December 2024 - The UN Secretary-General on Thursday urged the Security Council to act decisively to establish international guardrails for artificial intelligence (AI), warning tha… [+3109 chars]
Following are UN Secretary-General António Guterres' remarks to the Security Council meeting on artificial intelligence and the maintenance of international peace and security, in New York today:
Press ReleaseSecretary-General/ Statements and Messages
SG/SM/2250019 December 2024
Following are UN Secretary-General António Guterres' remarks to the Security Council meeting on artificial intel… [+7279 chars]
US government warns senior officials to use encrypted messaging apps due to cybersecurity concerns. Hackers allegedly affiliated with China exploited US surveillance systems, compromising private communications. CISA advises switching to end-to-end encrypted …
<ul><li>US government warns senior officials to use encrypted messaging apps due to cybersecurity concerns.</li><li>Hackers allegedly affiliated with China exploited US surveillance systems, compromi… [+4439 chars]
The EU wants to search all private chats, messages, and emails—here's what you need to know.
The logos of the messenger apps Signal, Telegram and WhatsApp.
Photothek via Getty Images
On December 12, 2024, the EU failed to reach consensus on the controversial Chat Control legislation during… [+2703 chars]
With AI, it's not only the sky that's the limit, it's the entire universe.
This is no secret, online criminals are leveraging artificial intelligence (AI) and large language models (LLMs) in their malicious schemes. While AI tends to be abused to trick people (i.e. deepfake… [+2971 chars]
Apps intended for child safety are being used to secretly spy on partners
Apps designed as tools to keep children safe are being exploited by domestic abusers to secretly spy on their partners.
The "booming market" for "family-tracking" apps that allow parents to see thei… [+3158 chars]
The holiday season is upon us, which can be one of the most stressful for family tech support. Keeping your family secure when online is a must, and this year, pCloud is offering some incredible deals that can secure your family’s digital future.
more…
The holiday season is upon us, which can be one of the most stressful for family tech support. Keeping your family secure when online is a must, and this year, pCloud is offering some incredible deal… [+3879 chars]
Get a head-start on your New Year's resolution to stay up-to-date on digital rights news by subscribing to EFF's EFFector newsletter!
This edition of the newsletter covers our top ten digital security resources for those concerned about the incoming admini…
Get a head-start on your New Year's resolution to stay up-to-date on digital rights news by subscribing to EFF's EFFector newsletter!
This edition of the newsletter covers our top ten digital secur… [+1212 chars]
Many companies understand the role of identity and access management (IAM) in protecting their enterprise security, but there are frequently obstacles to implementation.
Rohan Pinto is CTO/Founder of 1Kosmos BlockID and a strong technologist with a strategic vision to lead technology-based growth initiatives.
getty
As technology and cyber threats evolve, managing a… [+6417 chars]
The U.S. believes hackers affiliated with China's government are infiltrating telecoms and stealing users' data. The FBI has urged people to use end-to-end encryption to keep their info safe.
It's not often that apiece of FBI advice triggers a Snopes fact check. But the agency's urgent message this month to Americans, often summarized as "stop texting," surprised many consumers.
The warn… [+6253 chars]
Renters in the U.S. are dedicating an unprecedented share of their incomes to housing, with the average renter now spending 44 percent of their income on rent — well above the recommended 30 percent — according to Experian’s 2024 annual rental market report. …
Renters in the U.S. are dedicating an unprecedented share of their incomes to housing, with the average renter now spending 44 percent of their income on rent well above the recommended 30 percent ac… [+3828 chars]
Passwords have long been the cornerstone of digital security, but their time in the spotlight might be coming to an end. With the rise of sophisticated cyberattacks and the growing complexity of password management, experts are predicting a shift towards more…
Passwords have long been the cornerstone of digital security, but their time in the spotlight might be coming to an end. With the rise of sophisticated cyberattacks and the growing complexity of pass… [+4231 chars]
Unleash your creativity with premium Office apps, such as Word, Excel, and PowerPoint, ensuring you bring your ideas to life effortlessly. Read more...
Today's highlighted deal comes from our Apps & Software section of the Neowin Deals store, where you can save up to 50% on Microsoft 365 Personal or Family Subscriptions.
Upgrade your productivi… [+5721 chars]
This week, the United Nations General Assembly is set to adopt the UN Cybercrime Convention, almost exactly five years after it approved a resolution to launch its negotiation. The Convention text has been widely panned by digital security experts, human righ…
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
This post is part one in a series of posts about EFF’s work in Europe.
EFF’s mission is to ensure that technology supports freedom, justice, and innovation for all people of the world. While our work has taken us to far corners of the globe, in recent years…
This post is part one in a series of posts about EFFs work in Europe.
EFFs mission is to ensure that technology supports freedom, justice, and innovation for all people of the world. While our work … [+4854 chars]
U.S. government regulation has an impact on PQC availability, with different certified encryption methods being required for products handling government info.
In our recent blog, The Countdown Has Begun: Getting Started on your PQC Journey, we discussed both Q-Day, the moment when quantum computers will be able break all decryption, and the risk of Harvest… [+8711 chars]
<![CDATA[ CNA’s Fabian Koh looks at whether the NRIC still has any security significance in a digitised world, as well as some of the challenges that could come with unmasking them. ]]>
It was natural that the initial rollout of the new policy through ACRAs Bizfile portal caused some public concern, given how NRIC numbers have been treated historically in Singapore, said Singapore U… [+2538 chars]
"Lawful access by design" is "insecurity by design," say experts. Here's all you need to know.
The EU's plan to make all digital devices monitorable at all times poses "important risks of mass surveillance as well as substantial security and privacy threats."
This warning comes from a coaliti… [+2739 chars]
If you’ve been waiting for the perfect time to upgrade your operating system, now’s your moment. For just $17.97, you can grab a lifetime license for Microsoft Windows 11 Pro—a modern, powerhouse OS designed to make your digital life smoother, faster, and inf…
If youve been waiting for the perfect time to upgrade your operating system, nows your moment. For just $17.97, you can grab a lifetime license for Microsoft Windows 11 Proa modern, powerhouse OS des… [+1864 chars]
Starting Friday, two-factor authentication will be required for all Rivian accounts that connect to the brand's electric truck and SUV through the Rivian app or website.
Rivian EV accounts will require two-factor authentication starting Dec. 13.
Rivian
Friday the 13th is all about data safety instead of luck for Rivian account holders this year.
The EV startup is … [+2233 chars]
I had a unique opportunity during the AWS re: Invent conference to sit down with Steve Schmidt, VP of Security Engineering and Chief Security Officer at Amazon, and Ma...
Roughly 60,000 attendees invade Las Vegas for the annual AWS re:Invent conference.
Amazon / Noah Berger
Every year, AWS re:Invent transforms the neon-lit energy of Las Vegas into a global technolo… [+5695 chars]
The U.S. Payments Forum brings together insights from the industry’s top organizations in its fall market snapshot.......
REDWOOD CITY, Calif., Dec. 12, 2024 (GLOBE NEWSWIRE) -- The U.S. Payments Forum brings together insights from the industrys top organizations in its fall market snapshot. It offers perspectives on th… [+9045 chars]
Explore CEPA's latest recommendations for the European Commission, focusing on enhancing tech innovation and addressing digital security.
On Dec. 1, President Ursula von der Leyen, leader of the European Commission since 2019, launched a new set of mandates with a new team of commissioners. On Dec. 6, the Center for European Policy Ana… [+4948 chars]