#telecommunications-destruction

[ follow ]
Business intelligence
fromTechzine Global
1 day ago

AI deployment in networks is stalling as pressure on infrastructure mounts

AI adoption in network environments is slower than expected, with increasing infrastructure demands and significant challenges in deployment and integration.
US politics
fromTelecompetitor
11 hours ago

2.7 GHz band available for commercial use after clearing technical review

The 2.7 GHz band is now available for full-power commercial licensed use, enhancing coverage and capacity for next-generation applications.
Information security
fromThe Hacker News
21 hours ago

Analysis of 216M Security Findings Shows a 4x Increase In Critical Risk (2026 Report)

Critical risk findings surged by nearly 400% amid a 52% increase in raw alert volume, driven by AI-assisted development.
#cybersecurity
fromFortune
4 days ago
Privacy professionals

First they went after medtech, then Kash Patel. Iranian hackers' next target is likely 'low-hanging fruit' in water, energy, and tourism, experts say | Fortune

Artificial intelligence
fromwww.theguardian.com
4 days ago

US summoned bank bosses to discuss cyber risks posed by Anthropic's latest AI model

US Treasury secretary convened bank chiefs to address cybersecurity risks from Anthropic's AI model, Claude Mythos, which poses unprecedented threats.
Information security
fromTechSpot
5 days ago

Hackers are turning home routers into tools to spy on Microsoft 365 users

Forest Blizzard hackers exploit insecure routers to compromise devices and intercept traffic, targeting Microsoft 365 domains for sensitive data.
Silicon Valley
fromWIRED
1 day ago

The Dumbest Hack of the Year Exposed a Very Real Problem

A cyberattack in Silicon Valley exploited weak passwords to spoof crosswalk button recordings with voices of tech CEOs, raising security concerns.
Privacy technologies
fromYahoo Tech
4 days ago

Hackers Are Using Your Home Router to Spy on Microsoft 365 Users

Russian spies exploited consumer routers to steal Microsoft 365 credentials from thousands of users, turning home devices into espionage tools.
Information security
fromFast Company
1 day ago

Why the Iran cyberattack everyone warned about hasn't really happened yet

Iran-linked hackers have conducted minor cyberattacks in the U.S. but have focused on other regions with more significant incursions.
Privacy professionals
fromFortune
4 days ago

First they went after medtech, then Kash Patel. Iranian hackers' next target is likely 'low-hanging fruit' in water, energy, and tourism, experts say | Fortune

Iran-linked hackers are targeting high-profile figures and critical infrastructure in the U.S. and Israel to sow disruption.
Artificial intelligence
fromwww.theguardian.com
4 days ago

US summoned bank bosses to discuss cyber risks posed by Anthropic's latest AI model

US Treasury secretary convened bank chiefs to address cybersecurity risks from Anthropic's AI model, Claude Mythos, which poses unprecedented threats.
Information security
fromTechSpot
5 days ago

Hackers are turning home routers into tools to spy on Microsoft 365 users

Forest Blizzard hackers exploit insecure routers to compromise devices and intercept traffic, targeting Microsoft 365 domains for sensitive data.
EU data protection
fromComputerWeekly.com
1 day ago

UK reliance on US big tech companies is 'national security risk', claims report | Computer Weekly

The UK is at risk due to over-reliance on US tech companies for critical infrastructure, impacting national security.
fromwww.independent.co.uk
1 day ago

How much compensation you'll get if your broadband goes down under new rules

Customers of the UK's major broadband providers must receive payments when their connection stops working and is not fixed after two working days, under a voluntary scheme organised by communications regulator Ofcom.
London startup
#ai
Information security
fromFortune
4 days ago

Anthropic's Mythos is a wake up call, but experts say the era of AI-driven hacking is already here | Fortune

Anthropic's Mythos AI model is too dangerous to release widely due to its ability to exploit software vulnerabilities.
Artificial intelligence
fromFast Company
3 days ago

Is Mythos a blessing or a curse for cybersecurity? It depends on whom you ask

Claude Mythos AI model may enhance cybersecurity defenses but also poses risks for hackers due to its ability to identify vulnerabilities and create exploits.
Information security
fromFortune
4 days ago

Anthropic's Mythos is a wake up call, but experts say the era of AI-driven hacking is already here | Fortune

Anthropic's Mythos AI model is too dangerous to release widely due to its ability to exploit software vulnerabilities.
fromTelecompetitor
4 days ago

Robocalls up month-over-month, down year-over-year: Report

"It's disappointing to see the spike in robocalls in March, after six consecutive months averaging less than 4 billion robocalls," YouMail CEO Alex Quilici said in a prepared statement about the report.
Roam Research
Mobile UX
fromTheregister
5 days ago

South Korea introduces universal basic mobile data access

South Korea has implemented a universal basic mobile data access scheme providing unlimited downloads at 400 kbps for over seven million subscribers.
UK news
fromTheregister
4 days ago

UK seeks fresh perspectives to shape radio-jamming laws

The UK government is preparing legislation to ban radiofrequency jammers due to their use in various criminal activities and threats to public safety.
DevOps
fromTechzine Global
6 days ago

Networks that brought us here won't carry us into AI future

Network infrastructure must evolve to support the demands of agentic AI, making a refresh a strategic necessity for organizations.
Apple
fromTechRepublic
5 days ago

New Apple Scam Hits Millions of iPhone Users Worldwide, Draining Bank Accounts

Apple warns iPhone users about a surge in social engineering scams targeting bank accounts through panic-inducing messages.
fromTelecompetitor
1 week ago

AT&T addresses the problem of copper theft for the broadband industry

"In many major metropolitan areas and small towns, copper theft has escalated to levels that can only be described as systemic," Alcutt writes.
Business
Healthcare
fromSecurityWeek
6 days ago

Massachusetts Hospital Diverts Ambulances as Cyberattack Causes Disruption

Signature Healthcare in Brockton diverted ambulances due to a cyberattack, impacting services but not surgeries or procedures.
Digital life
fromAndroid Authority
1 week ago

Are any of the big three carriers still worth it in 2026? It's complicated...

The value of signing up with major carriers depends on individual needs and whether multiple lines are involved.
Roam Research
fromTelecompetitor
5 days ago

Second half of 2025 good for digital divide and Starlink: Ookla report

Starlink service significantly improved broadband access, reducing the digital divide in many states during the second half of last year.
fromSilicon Canals
1 week ago

Drone strikes on Gulf data centers reveal a $5 trillion infrastructure vulnerability no one planned for - Silicon Canals

The attacks forced a reckoning with one of the most consequential design flaws in global digital infrastructure: the concentration of military and civilian data on the same physical servers, in facilities that could become military targets the moment a conflict begins.
DevOps
France news
fromThe Local France
2 weeks ago

France begins shutdown of 2G network

Orange will deactivate its 2G network in parts of France starting April 1, affecting 28 municipalities and over 1.5 million devices.
Artificial intelligence
from24/7 Wall St.
5 days ago

The Real Reason Cloudflare Is Down 11% Today Has Nothing to Do With Insider Selling

Insider selling at Cloudflare is routine and does not indicate trouble; the real concern is competition from Anthropic's new AI offerings.
#fcc
fromZDNET
3 weeks ago
Privacy technologies

Buying a router? A new US ban just shrank your choices - here's why

Privacy professionals
fromTechCrunch
3 weeks ago

FCC bans import of new consumer routers made overseas, citing security risks | TechCrunch

The FCC has banned the import of new foreign-made consumer routers due to cybersecurity risks to U.S. national security.
fromZDNET
3 weeks ago
Privacy technologies

Buying a router? A new US ban just shrank your choices - here's why

Privacy professionals
fromTechCrunch
3 weeks ago

FCC bans import of new consumer routers made overseas, citing security risks | TechCrunch

The FCC has banned the import of new foreign-made consumer routers due to cybersecurity risks to U.S. national security.
DevOps
fromComputerWeekly.com
2 weeks ago

Mobile network operators urged to help commercialise 5G live production | Computer Weekly

A consortium urges MNOs to provide standardized QoD APIs for reliable, low-latency live broadcast production connectivity.
Business intelligence
fromComputerWeekly.com
1 week ago

Wireless AI paradox emerges as Wi-Fi evolves into strategic growth engine | Computer Weekly

Strategic investments in wireless and AI are crucial for businesses to achieve operational efficiency and productivity gains.
#quantum-computing
fromTelecompetitor
2 months ago
Information security

Quantum security efforts must start now: Report

Quantum computing will break current public-key encryption; urgent deployment of post-quantum cryptography and migration strategies is required to protect long-term data confidentiality.
fromTelecompetitor
1 month ago

Time to sunset rules mandating copper maintenance: USTelecom

The goal of the new USTelecom program is to show consumers, businesses, civic leaders, and policymakers why maintaining legacy copper for the small portion of end users is not an efficient approach. A key part of this is explaining why modern technology is better.
Digital life
World politics
fromSilicon Canals
1 month ago

I mapped who profits when a country's internet gets shut down - it's never who you think - Silicon Canals

Internet shutdowns generate profit for corporate intermediaries, surveillance vendors, and geopolitical actors beyond the governments implementing them, creating a hidden political economy of disconnection.
Information security
fromSecurityWeek
6 days ago

FBI: Cybercrime Losses Neared $21 Billion in 2025

Cyber-enabled crime losses increased by 26% in 2025, nearing $21 billion, with investment fraud being the most significant contributor.
Digital life
fromTelecompetitor
1 month ago

Fiber access grew in the last half of 2025, but 5G growth slowed: Analysis

Fiber internet providers accelerated expansion to 8.4% growth in late 2025, adding 5.2 million addresses and achieving 99%+ coverage in 182 counties, while overall served locations increased and unserved locations decreased by 8.4%.
Information security
fromSecuritymagazine
1 week ago

Ransomware Response: How Businesses Regain Control Under Pressure

Ransomware attacks create urgent pressure, forcing quick decisions and impacting operations, legal obligations, and overall enterprise strategy.
#internet-outages
fromZDNET
2 months ago
Tech industry

Why the internet kept breaking and taking down your favorite sites in 2025

fromZDNET
2 months ago
Tech industry

Why the internet kept breaking and taking down your favorite sites in 2025

Marketing
fromBusiness Matters
2 months ago

Telecoms' debt problem hides a deeper truth about how the industry really works

Telecom profitability depends more on efficient commercial operations—sales, distribution, customer acquisition and retention—than on asset ownership or network coverage.
US politics
fromNextgov.com
2 months ago

Senator says AT&T and Verizon blocked release of Salt Typhoon security reports

AT&T and Verizon blocked release of Mandiant security assessments on Salt Typhoon, prompting calls for the carriers' CEOs to testify before Congress.
fromTechCrunch
1 month ago

Salt Typhoon is hacking the world's phone and internet giants. Here's everywhere that's been hit. | TechCrunch

Salt Typhoon is behind one of the broadest hacking campaigns in recent years, targeting some of the world's largest phone and internet companies and stealing tens of millions of phone records about senior government officials. The hacking group, attributed to China, is part of a wider cluster of hackers with the collective aim of helping China prepare for an eventual war with Taiwan.
Privacy professionals
US news
fromThe Verge
2 months ago

Verizon's wireless network is down for many people nationwide

Verizon is experiencing a widespread wireless voice and data outage across the US, leaving many customers unable to connect since just after noon ET.
World news
fromIrish Independent
1 month ago

X suffers major outage weeks after similar collapse

X (formerly Twitter) experienced a global outage that prevented loading of the app and website, showing only the X logo and no posts.
Artificial intelligence
fromTechzine Global
1 month ago

Making sense of 6G: what will the 'agentic telco' look like?

6G networks will integrate AI across all layers to enable autonomous, physical AI applications like self-driving cars and robotic systems, with multiple industry players collaborating on open standards by 2030.
World news
fromwww.dw.com
2 months ago

X outages affect thousands of users primarily in US

Elon Musk's social platform X experienced outages affecting tens of thousands of users worldwide, with over 41,000 US reports, 8,000 UK, and 2,400 in India.
Digital life
fromInc
1 month ago

The 'Zombie Internet' Has Arrived, Bringing Devastating Consequences to These Sectors

A new "zombie internet" of AI agents and bot-driven systems is emerging and could fundamentally disrupt advertising, social media, and the human-centered web.
fromSecurityWeek
1 month ago

Global Coalition Publishes 6G Security and Resilience Principles

The security and resilience of 6G networks are critical aspects of that wider picture. 6G networks - both public and private - will come to play a vital role in the everyday life of people around the world, with much of our lives reliant on their efficient and secure operation.
Information security
Information security
fromTheregister
2 months ago

Supply chain breaches fuel cybercrime cycle, report says

Cybercriminals are industrializing supply chain attacks into a self-reinforcing ecosystem combining package compromise, credential theft, identity attacks, and ransomware.
#cyberwarfare
Information security
fromNextgov.com
1 month ago

Hackers are exploiting exposed Cisco products, Five Eyes intelligence agencies say

CISA, NSA, and Five Eyes partners issued an emergency alert about a significant cyber threat exploiting Cisco wide-area networking vulnerabilities, affecting federal and global networks.
Information security
fromTechzine Global
1 month ago

Why cyberattacks don't require advanced hacking

Poor cyber hygiene, weak identity security, overdue IT maintenance, and incomplete logging make organizations vulnerable to financially motivated attacks such as ransomware and email fraud.
[ Load more ]