A Beijing court will have to decide if an AI-generated voice, alleged to resemble a voiceover artist and used without her approval, has infringed on her right to voice.
Another reason to keep your software updated: Security researchers find these password managers on Android share a vulnerability that could cause password leaks.
Now is the time for businesses to start thinking about how they'll create a governance framework for their generative artificial intelligence applications.
At Open Source Summit Japan, Linux developer Greg Kroah-Hartman recaps the current state and future challenges of kernel security, including the specter of government regulation and the essential pain of unceasing updates.
When the end-of-support deadline rolls around in October 2025, you'll need to pay to keep receiving security updates for your Windows 10 PC. But Microsoft won't say how much those updates will cost.
With several nations expected to hold elections next year, Meta confirms its generative AI advertising tools cannot be used for campaigns targeting specific services and issues.
Australia's defense intelligence agency has updated its cyber risk mitigation guidelines for businesses, making changes in several areas including timeline for applying critical patches and limits to admin privileges.
The OpenAI debacle has widened the scope of this debate, but the underlying message remains the same, especially for governments still figuring out their role in an AI-powered regime, suggests ZDNET's Eileen Yu.
In a rollercoaster ride of a weekend for generative AI darling OpenAI, co-founders Sam Altman and Greg Brockman are now at Microsoft and OpenAI is grappling with how to move forward.
While confirming a software upgrade was carried out on its Singtel Internet Exchange backbone network, the carrier denies this was the root cause of the massive outage suffered by its Australian subsidiary Optus.
A technical network fault has been blamed for the hours-long outage that left more than 10 million in Australia without access to telephone and broadband services, including emergency lines.
Published by the UK, the Bletchley Declaration pulls together 28 nations in an agreement to collectively identify and manage potential risks from "frontier" artificial intelligence.
The Singapore-led initiative aims to provide a standard set of benchmarks to assess generative AI products, pooling resources from big market players that include Anthropic, Google, and Microsoft.
Apple's latest iOS release does fix a raft of iPhone issues. Sadly, the Flipper Zero lockup bug remains a threat to any iOS device in its immediate vicinity.
With the release of iOS 14, Apple promised to protect iPhone users from having the MAC address of their devices being tracked. That feature was fundamentally broken. Until now.
Amid growing concern over how businesses are using personal data to drive AI adoption, the United Nations has formed an advisory body to assess how the technology should be governed.
Just a third of organizations in Asia-Pacific will be able to benefit from AI, with the rest held back by some key issues, predicts research firm Forrester.
Regulators have proposed a shared responsibility framework detailing who should be held responsible in the event of a phishing scam, with consumers also taking on some liability.
Linux is considered the most secure operating system on the planet. But you might be surprised to find out that Ubuntu doesn't ship with the firewall enabled or a simple-to-use GUI installed. Let's fix that.
This iOS security scanner delivers a crash course in protecting your iPhone or iPad. In fact, iVerify does a much better job of explaining new iOS features and security than Apple does.
With strong passwords and 2FA on important accounts, you're doing all the right things to keep your online accounts secure. But wait, are you missing something else?
Enterprises are concerned their data may be targeted for harvest now and decrypted in the future by cybercriminals when the ability to do so emerges, a global study reveals.
The ransomware business is booming, and really anyone can be the next victim. Here's how to protect yourself and your organization from an attack. Too late for prevention? We'll show you what to do next.
Guidelines and tools designed to help organizations strengthen their cyber posture will be rendered useless if rules aren't in place to ensure such practices are adopted.
All the tech around us is collecting our personal data. ZDNET's updated guide tells you everything you need to know about securing your online accounts and identity from hackers, scam artists, stalkers, and even the government.
Want to avoid having your online accounts hacked? Two-factor authentication is a crucial security measure requiring an extra step for signing in to high-value services. Here's how to set up 2FA and which accounts to focus on.