YouTube is fighting deepfakes with new Likeness Detection tool

YouTube Likeness Detection deepfakes

In an age of fragmented news, deepfakes present a real problem. YouTube is taking action to stop AI-generated videos being used to impersonate people.

The company has revealed details of its new Likeness Detection tool. For now, YouTube is targeting creators, giving them access to the tool – not only because creators are among those likely to be deepfaked, but also because the company will be hoping to be able to use their influence to hype up Likeness Detection.

Continue reading

Meta rolls out warnings to help protect older WhatsApp and Messenger users from scams

Meta scams

Online scams are nothing new, but there are now more channels through which they can be run. Among them are social platforms like WhatsApp and Messenger, and it is sad fact that older users are more likely to fall victim

This is precisely why Meta is rolling out a new system of warnings that appear in its messaging apps. The aim is to make users think twice about who they connect to and who they share information with as part of Cybersecurity Awareness Month.

Continue reading

Instagram lets teenage users choose a different app icon

Instagram icons

Most of the talk about teenagers using social media centers around keeping them safe or restricting what they are able to do. In many regards Instagram is no different, but now younger users are being given something extra.

Instagram’s design team has proudly announced the users with Teen accounts will be able to choose between a number of “aesthetics” for the app. Not available to anyone with a non-Teen account, the new option allows teenagers to select a different icons for the app, designed by Carlos Oliveras Colom.

Continue reading

How enterprise developers are moving from fragmented tools to unified platforms [Q&A]

Software architecture development

Across large organizations, developers and DevOps teams rely on an ever-growing collection of specialized tools. But while these offer valuable flexibility, they can also create significant pain points.

We spoke to Chintana Wilamuna, VP of solutions architecture at WSO2, about how the landscape is changing from fragmented, purpose-built development tools toward comprehensive, unified platforms.

Continue reading

Casio unveils ring-sized G-SHOCK with full shock resistance and water protection

Casio DWN-5600

Clearly following the old adage that good things come in small packages, Casio has introduced the DWN-5600, a new addition to its G-SHOCK lineup that shrinks the iconic watch down to a ring-sized form, without compromising the brand’s signature durability.

Modeled after the classic 5600 series, which carries the original G-SHOCK design, the DWN-5600’s case measures just 23.4mm x 20mm with a thickness of 7.5mm.

Continue reading

ESET brings its ransomware protection to home and small business users

Ransomware

ESET has added new ransomware recovery and scam protection capabilities to its consumer and small business products. The security firm's latest offerings, ESET HOME Security and ESET Small Business Security, bring its enterprise-grade Ransomware Remediation feature to homes and small offices for the first time.

Ransomware incidents remain among the most damaging forms of cybercrime worldwide. ESET’s Ransomware Remediation system automatically creates encrypted backups when a threat is detected, so that users can restore any affected files once the attack has been neutralized, hopefully minimizing downtime and data loss.

Continue reading

Titan 1 aims to bring console-level gaming to tablets

Headwolf Titan 1

Headwolf has announced the Titan 1, a gaming-focused tablet made to combine high performance with portable design.

The Titan 1 is powered by MediaTek’s Dimensity 8300 chipset, built on a 4nm process, with an eight-core CPU and six-core GPU. Headwolf claims the chip can handle demanding mobile titles such as Genshin Impact and PUBG Mobile at high settings without frame drops.

Continue reading

Opera brings deep research capabilities to its Neon AI browser

Opera Neon

Opera is expanding its recently launched AI browser with a new Deep Research Agent to perform more complex research and analysis directly in the software.

The new agent, called ODRA, joins Opera Neon’s growing lineup of built-in AI systems and is part of the Norwegian browser maker’s plan to make agentic browsing more practical for everyday use.

Continue reading

Cybercriminals turn to stealth to bypass malware detection

Hacker malware stealth

A new report reveals a 40 percent (quarter-over-quarter) increase in evasive, advanced malware. The data highlights encrypted channels as adversaries' favored attack vector using Transport Layer Security (TLS), the encryption protocol behind most secure web traffic.

The study from WatchGuard Technologies, which provides cybersecurity for MSPs, shows 70 percent of all malware is now delivered via encrypted connections, the findings highlight attackers’ increasing reliance on obfuscation and stealth, and the need for organizations to improve visibility into encrypted traffic and adopt flexible protection strategies.

Continue reading

Grok Imagine launches Spicy Mode, for 'edgier, more visually daring' creations

Shocked

xAI, Elon Musk’s artificial intelligence company, has officially added 'Spicy Mode' to its Grok Imagine platform, and that is exactly what it sounds like -- a tool for creators who want to push AI-generated video into more adult, provocative territory.

Spicy Mode is described as a way for creators to explore emotional and artistic freedom, but it also lands squarely in the debate over whether generative AI should be trusted with sexualized or explicit material.

Continue reading

Ransomware payments hit record highs as threats get harder to detect

Ransomware key cash

The frequency of ransomware attacks has dropped from eight incidents per organization to five or six incidents in the last year, but at the same time the average ransomware payment has surged by more than a million dollars, from $2.5M to $3.6M.

A new Global Threat Landscape report from ExtraHop, based on research by Censuswide, finds threat actors are shifting away from broad, indiscriminate attacks to a more targeted approach that yields better results.

Continue reading

Observability data drives key decisions on customer experience and more

Observability magnifier code

The latest Splunk State of Observability report for 2025, released today by Cisco, shows that observability insights are guiding key business decisions in customer experience, product roadmap forecasting, and brand perception.

The study based on a survey of 1,855 ITOps and engineering professionals worldwide, and underscores how observability has evolved beyond an IT function to a boardroom priority. It finds 74 percent believe observability is important for monitoring critical business processes and 66 percent say it is key to understanding user journeys.

Continue reading

Supply chain security risks are becoming unmanageable

Supply chain procurement

A new survey finds 60 percent of surveyed UK and US cybersecurity leaders now admit that security risks originating from third parties and supply chain partners are ‘innumerable and unmanageable.’

The study from IO (which used to be ISMS online) shows 97 percent of cybersecurity leaders say they’re confident in their breach response, with 61 percent describing themselves as ‘very confident.’ Yet, that confidence contrasts dramatically with 61 percent of leaders who say their organization has suffered a third-party or supply chain attack in the past 12 months.

Continue reading

Microsoft releases emergency update for Windows 11 after breaking the Windows Recovery Environment

Windows 11 laptop and mobile

Microsoft has released an out-of-band update for Windows 11 to address a problem caused b y the October security updates published for the operating system earlier this month.

Users who installed the KB5066835 update found that they were not able to use their USB mouse or keyboard within the Windows Recovery Environment (WinRE). This made it impossible for some to navigate the recovery options, forcing Microsoft to investigate what was going on.

Continue reading

Apple decides to let users control Liquid Glass transparency

Liquid Glass controls

Any major visual change to software is likely to result in a mixed reaction – this is certainly true of the Liquid Glass transparency effect Apple introduced into its desktop and mobile operating system recently.

Apple is a company that prides itself on producing designs that balance beauty with utility, so it was probably surprised when users complained about Liquid Glass. Not willing to give in entirely and allow users to switch the effect off completely, Apple has relented a little, introducing controls to change the intensity of the look.

Continue reading

Load More Articles