Skip to content
Sunday, Jan 25, 2026
Subscribe

HOME

  • Twitter
  • Facebook
  • LinkedIn
  • Instagram
  • YouTube
  • AI
  • Business
  • Computing
  • Cybersecurity
  • Hardware
  • Innovation
  • Manufacturing
  • Policy
  • Software
  • Startups
  • Technology

Category: Cybersecurity

Petco’s Vetco site exposed pet medical records to the open web
CybersecurityDataPrivacy

Petco’s Vetco site exposed pet medical records to the open web

Petco has taken its Vetco Clinics website offline after a security lapse exposed sensitive customer and pet medical records. The vulnerability allowed anyone to download files by guessing sequential customer ID numbers.

by Henry BlakemoreDecember 10, 2025
Malicious VS Code Extensions Are Stealing Dev Data Right Now
CybersecuritySoftwareTechnology

Malicious VS Code Extensions Are Stealing Dev Data Right Now

A new pair of malicious Visual Studio Code extensions has been caught stealing developer data. They disguise themselves as a color theme and an AI assistant to deliver a powerful infostealer.

by Nathan CrossDecember 9, 2025
Apple and Google Warn Users About New Spyware Attacks
CybersecurityPrivacySoftware

Apple and Google Warn Users About New Spyware Attacks

Tech giants Apple and Google have sent out a new wave of threat notifications to users worldwide. The warnings are for suspected targeted spyware attacks, often linked to state-backed actors.

by Nathan CrossDecember 8, 2025
Linux Isn’t Virus-Proof, and It’s Time to Stop Pretending It Is
CybersecuritySoftwareTechnology

Linux Isn’t Virus-Proof, and It’s Time to Stop Pretending It Is

Linux’s security model is robust, but it’s not a magic shield. With more “typical” users adopting it and servers under constant automated attack, the old assumptions are crumbling. Security is about layers, not blind faith in an OS.

by Henry BlakemoreDecember 7, 2025
US cybersecurity agency says to stop using personal VPNs
CybersecurityPrivacySoftware

US cybersecurity agency says to stop using personal VPNs

The US Cybersecurity and Infrastructure Security Agency has issued a stark warning against using personal VPN services. The agency says they often shift risk to a less trustworthy provider and can increase your attack surface.

by Henry BlakemoreDecember 5, 2025
Apple’s Bug Bounty Cuts Are a Bad Look as Mac Malware Surges
ComputingCybersecuritySoftware

Apple’s Bug Bounty Cuts Are a Bad Look as Mac Malware Surges

The long-held belief that Macs are immune to serious malware is crumbling. Security firms are tracking a sharp rise in threats, making Apple’s decision to cut bug bounty payouts particularly poorly timed.

by Henry BlakemoreDecember 5, 2025
Brothers with hacking history try AI to cover tracks after firing
CybersecurityPrivacySoftware

Brothers with hacking history try AI to cover tracks after firing

Two brothers, both federal contractors with prior hacking convictions, have been charged with a brazen data destruction spree. According to the DOJ, they deleted sensitive databases just minutes after being terminated and used an AI tool to try and hide the evidence.

by Henry BlakemoreDecember 4, 2025
Pentagon Watchdog Finds Hegseth’s Secret Phone System
CybersecurityPrivacyTechnology

Pentagon Watchdog Finds Hegseth’s Secret Phone System

A Pentagon Inspector General report details a system installed for Defense Secretary Pete Hegseth that let him access his personal cellphone from his secure office. The investigation ties this to his use of Signal to share sensitive info on Yemen airstrikes, concluding it risked U.S. forces.

by Henry BlakemoreDecember 4, 2025
Why Utilities Can’t Ignore the Airwaves Anymore
CybersecurityDataIoT

Why Utilities Can’t Ignore the Airwaves Anymore

A new security standard is pushing utilities to look beyond their wired networks. The real threat, and the new compliance focus, is now in the unmonitored radio waves around critical infrastructure.

by Nathan CrossDecember 4, 2025
Antivirus is Just the Start of Your Security Strategy
CybersecurityPrivacySoftware

Antivirus is Just the Start of Your Security Strategy

A new CNET report breaks down the specific threats antivirus can and cannot handle. With 75% of Americans hit by online attacks, it’s a crucial baseline—but far from a complete solution.

by Henry BlakemoreDecember 2, 2025

Posts pagination

Previous 1 … 4 5 6 … 19 Next

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025

Categories

  • Technology (1183)
  • Business (757)
  • AI (634)
  • Innovation (617)
  • Software (580)
  • Hardware (260)
  • Computing (217)
  • Startups (186)
  • Cybersecurity (183)
  • Manufacturing (144)
  • Policy (119)
  • Privacy (118)
  • Science (110)
  • Semiconductors (104)
  • Cloud (101)
  • Gaming (81)
  • Data (63)
  • Energy (60)
  • Economy (50)
  • Research (49)

Featured Posts

MI6’s New Boss Wants Spies Who Code Like They Speak Russian
MI6’s New Boss Wants Spies Who Code Like…
December 16, 2025
Spotify Finally Lets You Ditch Other Music Services
Spotify Finally Lets You Ditch Other Music Services
November 21, 2025
Texas Sues Samsung, LG, Sony Over TV Spying Claims
Texas Sues Samsung, LG, Sony Over TV Spying…
December 17, 2025

Gallery

Why Every Company Needs a Geopolitical Risk Officer Now - Professional coverage
Chinese Bitcoin Miner Maker Under US Security Probe - Professional coverage
Python Finally Gets Official Lazy Imports After Years of Waiting - Professional coverage
The AI Boom's Real Bottleneck Isn't Chips, It's Power - Professional coverage
Navigating Windows 10's End of Life: Secure Your System with Free Extended Updates - Professional coverage

Recent Posts

Dell Dials Down the AI PC Hype, Focuses on Gaming Instead
Dell Dials Down the AI PC Hype, Focuses…
January 9, 2026
Anritsu and VTT Just Proved D-Band Wireless is Real
Anritsu and VTT Just Proved D-Band Wireless is…
January 9, 2026
My AM5 Upgrade Got Killed By DDR5 Prices, So I Overclocked My DDR4 Instead
My AM5 Upgrade Got Killed By DDR5 Prices,…
January 9, 2026
Quick Links
  • About Us
  • Contact Us
  • Privacy Policy
  • Terms of Service
  • Report Content

© 2026 Industrial Computing News. All Rights Reserved.