Search results for "security"

Exclusive-U.S. Warned Firms About Russia's Kaspersky Software Day After Invasion -Sources

The U.S. government began privately warning some American companies the day after Russia invaded Ukraine that Moscow could manipulate software designed by Russian cybersecurity company Kaspersky to cause harm, according to a senior U.S. official and two people familiar with the matter. The classified briefings are part of Washington’s broader strategy to prepare providers of […]

Huawei 'More United' in Face of U.S. Pressure, Says Repatriated CFO

U.S. pressure on Huawei Technologies has served to strengthen the resolve of the Chinese telecoms giant, finance chief Meng Wanzhou said on Monday after its first set of results since her return from nearly three years’ detention in Canada. The daughter of Huawei founder Ren Zhengfei played a central role in the company’s tussle with […]

Saudi Telecommunication Company (STC): When an Oligopoly Replaces a Fading Monopoly

The Saudi Telecommunication Company, known as STC, is the leading telecom operator in the Kingdom of Saudi Arabia (KSA), competing with United Arab Emirates (UAE)-based Etisalat for the number one spot in the region. Established in 1998, the company has been witnessing successive periods of evolution and portfolio diversification that often mirror the telecom landscape […]

Avoiding Growing Cybercrime Risks for People and Companies

If you’re breathing right now, you are on the internet. You will likely still be on the internet if you are still breathing after the 3-minute read. If you wouldn’t go hiking without a map or sailing without a compass, then you shouldn’t surf the internet without at least a minimal understanding of the threats lurking […]

China Sets Green Hydrogen Target for 2025, Eyes Widespread Use

China’s top economic planner announced a target on Wednesday to produce up to 200,000 tonnes per year of green hydrogen, a zero-carbon fuel generated from renewable energy sources, by 2025, but envisions a more widespread industry over the long term. The country aims to produce 100,000 tonnes to 200,000 tonnes of green hydrogen a year […]

EU Rules Must Focus on AI Benefits Not Curbs, Lawmaker Says

Europe’s attempt to set landmark rules for artificial intelligence should take a positive approach to reap the benefits of the technology rather than restrict it, European Parliament lawmaker Svenja Hahn said on Tuesday. The European Commission last year proposed its AI rules in a bid to take the lead in a technology dominated by China […]

U.S. President Biden Executive Order on Cryptocurrencies

In the past year, centralized and decentralized currencies alike witnessed extensive market growth, and their popularity among the public has grown along the way. On March 9, 2022, U.S. President Joe Biden issued an executive order on cryptocurrencies, sketching an inclusive governmental approach to deal with probable risks related to the significant evolution in digital assets, emphasizing cryptocurrencies.  […]

Dissecting the Birth of e&: When Vision and Ambition Meet Opportunism

The United Arab Emirates (UAE) has been witnessing consecutive waves of changes to the various constituent sectors shaping its economy. As part of its vision for decades to come, the gulf state is looking to secure a futureproof resilient strategy by unlocking potential economic growth opportunities that will allow different sectors to change, progress, and […]

Australian Watchdog Sues Facebook-Owner Meta Over Scam Advertisements

Australia’s competition watchdog filed a lawsuit against Facebook owner Meta Platforms on Friday, alleging the social media giant failed to prevent scammers using its platform to promote fake ads featuring well-known people. The advertisements, which endorsed investment in cryptocurrency or money-making schemes, could have misled Facebook users into believing they were promoted by famous Australians, […]

What Makes Ethical Hacking “Ethical”

While hacking plays a fundamental role in altering the development of systems and networks, ethical hacking is confined within the borders of having an authorized attempt to obtain unsolicited accessibility to the system, application, and even data. What makes ethical hacking “ethical” is the involvement of duplicating strategies and actions of malicious infiltrators, with the sole […]