News Gist .News

Articles | Politics | Finance | Stocks | Crypto | AI | Technology | Science | Gaming | PC Hardware | Laptops | Smartphones | Archive

Protecting Your Phone at Protests: A Matter of National Security?

Taking necessary precautions before attending a protest is crucial to safeguard your personal data and avoid potential consequences. Many people are unaware of the risks associated with using their smartphones during protests, which can put them in harm's way. By being mindful of your digital footprint and taking steps to protect yourself, you can ensure that your identity remains private.

See Also

TikTok’s American Ownership Rule Ignores Bigger IoT Threat Δ1.73

The debate over banning TikTok highlights a broader issue regarding the security of Chinese-manufactured Internet of Things (IoT) devices that collect vast amounts of personal data. As lawmakers focus on TikTok's ownership, they overlook the serious risks posed by these devices, which can capture more intimate and real-time data about users' lives than any social media app. This discrepancy raises questions about national security priorities and the need for comprehensive regulations addressing the potential threats from foreign technology in American homes.

Researchers Uncover Unknown Android Flaws Used to Hack Into a Student's Phone Δ1.72

Amnesty International said that Google fixed previously unknown flaws in Android that allowed authorities to unlock phones using forensic tools. On Friday, Amnesty International published a report detailing a chain of three zero-day vulnerabilities developed by phone-unlocking company Cellebrite, which its researchers found after investigating the hack of a student protester’s phone in Serbia. The flaws were found in the core Linux USB kernel, meaning “the vulnerability is not limited to a particular device or vendor and could impact over a billion Android devices,” according to the report.

Protesters Target Tesla and Elon Musk in Portugal Ahead of Snap Election Δ1.71

Dozens of demonstrators gathered at the Tesla showroom in Lisbon on Sunday to protest against CEO Elon Musk's support for far-right parties in Europe as Portugal heads toward a likely snap election. Musk has used his X platform to promote right-wing parties and figures in Germany, Britain, Italy and Romania. The protesters are concerned that Musk's influence could lead to a shift towards authoritarianism in the country.

Protecting Yourself From Vishing Attacks Surged 442% Last Year Δ1.71

Vishing attacks have skyrocketed, with CrowdStrike tracking at least six campaigns in which attackers pretended to be IT staffers to trick employees into sharing sensitive information. The security firm's 2025 Global Threat Report revealed a 442% increase in vishing attacks during the second half of 2024 compared to the first half. These attacks often use social engineering tactics, such as help desk social engineering and callback phishing, to gain remote access to computer systems.

The Industry Shifts to a New Era of Smartphone Safety for Teens. Δ1.71

Worried about your child’s screen time? HMD wants to help. A recent study by Nokia phone maker found that over half of teens surveyed are worried about their addiction to smartphones and 52% have been approached by strangers online. HMD's new smartphone, the Fusion X1, aims to address these issues with parental control features, AI-powered content detection, and a detox mode.

Your Email Address Is Your Digital Passport, Not Just a Password Δ1.71

In the realm of cybersecurity, the emphasis on strong passwords often overshadows the critical importance of protecting one's email address, which serves as a digital identity. Data breaches and the activities of data brokers expose email addresses to threats, making them gateways to personal information and potential scams. Utilizing email aliases can offer a practical solution to mitigate these risks, allowing individuals to maintain privacy while engaging online.

Under the Hood of Data Sovereignty Δ1.71

Organizations are increasingly grappling with the complexities of data sovereignty as they transition to cloud computing, facing challenges related to compliance with varying international laws and the need for robust cybersecurity measures. Key issues include the classification of sensitive data and the necessity for effective encryption and key management strategies to maintain control over data access. As technological advancements like quantum computing and next-generation mobile connectivity emerge, businesses must adapt their data sovereignty practices to mitigate risks while ensuring compliance and security.

Anti-Trump Activists Target Elon Musk's Tesla Brand to Protest DOGE Cuts Δ1.70

A grassroots movement has emerged, with approximately 350 demonstrators protesting outside Tesla dealerships to voice their discontent over Elon Musk's involvement in significant federal job cuts. Organizers are urging the public to boycott Tesla, aiming to tarnish its brand image and impact Musk financially due to his controversial role in the Trump administration. This activism highlights the intersection of corporate branding and political sentiment, as Tesla, once celebrated for its environmental focus, is now perceived as a symbol of the current administration’s policies.

UK Asks Social Media Firms to Assess Online Risks by March 31 Δ1.70

Britain's media regulator Ofcom has set a March 31 deadline for social media and other online platforms to submit a risk assessment around the likelihood of users encountering illegal content on their sites. The Online Safety Act requires companies like Meta, Facebook, Instagram, and ByteDance's TikTok to take action against criminal activity and make their platforms safer. These firms must assess and mitigate risks related to terrorism, hate crime, child sexual exploitation, financial fraud, and other offences.

7 Rules to Follow Before Installing a Home Security Camera - And Where You Should Never Put One Δ1.70

Installing a home security camera requires careful consideration to optimize its effectiveness and to avoid legal repercussions regarding privacy. Key factors include avoiding obstructions, ensuring proper positioning to capture critical areas without infringing on neighbors' privacy, and steering clear of heat sources that could damage the equipment. By following these guidelines, homeowners can enhance security while respecting the legal and ethical boundaries of surveillance.

UK Probes How TikTok, Reddit, and Imgur Protect Child Privacy Δ1.70

The U.K.'s Information Commissioner's Office (ICO) has initiated investigations into TikTok, Reddit, and Imgur regarding their practices for safeguarding children's privacy on their platforms. The inquiries focus on TikTok's handling of personal data from users aged 13 to 17, particularly concerning the exposure to potentially harmful content, while also evaluating Reddit and Imgur's age verification processes and data management. These probes are part of a larger effort by U.K. authorities to ensure compliance with data protection laws, especially following previous penalties against companies like TikTok for failing to obtain proper consent from younger users.

Investigation Into Social Media Companies Over Children's Personal Data Practices Δ1.70

Britain's privacy watchdog has launched an investigation into how TikTok, Reddit, and Imgur safeguard children's privacy, citing concerns over the use of personal data by Chinese company ByteDance's short-form video-sharing platform. The investigation follows a fine imposed on TikTok in 2023 for breaching data protection law regarding children under 13. Social media companies are required to prevent children from accessing harmful content and enforce age limits.

South Korean Police Prepare for 'Worst-Case Scenarios' Ahead of Yoon Impeachment Ruling Δ1.70

The Constitutional Court's decision on President Yoon Suk Yeol's impeachment is expected to spark significant unrest, with authorities preparing for the worst. As tensions rise, police are taking extraordinary measures to ensure public safety, including closing subway stations and schools near the court. The National Police Agency has set up plans considering the most extreme scenarios, which could lead to violent clashes between supporters and opponents.

US Lawmakers Press Chinese Telecoms Over Ties to Military, Government Δ1.70

US lawmakers have raised national security concerns in letters to top Chinese telecom companies, China Mobile, China Telecom, and China Unicom, citing the potential for these firms to exploit access to American data through their U.S. cloud and internet businesses. The lawmakers are seeking details on any links between the companies and the Chinese military and government by March 31, amid concerns about unauthorized data access, espionage, or sabotage. National security experts have warned that China Telecom's operations in the US could pose a significant risk to American telecommunications networks.

The Best Phone to Buy Right Now. Δ1.69

Consumers seeking a new smartphone can find a variety of reliable options that prioritize usability over groundbreaking innovation. Current offerings include solid choices across different price ranges, with features that cater to everyday needs while ensuring longevity in software updates and performance. The market reflects a shift towards iterative improvements rather than dramatic changes, allowing users to find devices that seamlessly integrate into their daily lives.

Elon Musk's Tesla Facilities Face 'Takedown' Protests Δ1.69

Tesla facilities across the US are facing protests and vandalism in response to Elon Musk's role in the Trump administration. Most "Tesla Takedown" protests have been peaceful, but a few have been destructive with fires intentionally set at Tesla showrooms and charging stations in Colorado and Massachusetts last week. The protests illustrate a growing unease over Musk's influence on the US government.

Protecting Yourself From Tax-Related Scams in 2025: 10 Expert Tips Δ1.69

Almost half of people polled by McAfee say they or someone they know has received a text or phone call from a scammer pretending to be from the IRS or a state tax agency, highlighting the growing threat of tax-related scams. The scammers use various tactics, including social media posts, emails, text messages, and phone calls, to target potential victims, often with promising fake refunds. To protect themselves, individuals can take steps such as filing their taxes early, monitoring their credit reports, watching out for phishing attacks, and being cautious of spoofed websites.

Avoiding Drone Disaster: Don't Skip Pre-Flight and Post-Flight Checklists Δ1.69

A comprehensive pre-flight and post-flight checklist is crucial for safe and reliable drone operation, helping to avoid accidents and extend the life of your technology. By regularly inspecting their drones, users can identify potential issues before they become major problems, reducing the risk of crashes and damage. Regular maintenance also helps to prevent costly repairs and ensures that the drone remains in good working order.

How to Know if Someone Blocked Your Number Δ1.69

Determining whether someone has blocked your number can be challenging, as there are no straightforward methods to confirm this without access to their settings. Common indicators include the behavior of calls and text messages, such as calls being dropped after one ring or the absence of read receipts in texts. While these signs can provide hints, they are not definitive, and it is often best to allow some time for a response or to seek information from mutual contacts.

Big Ben Incident Raises Concerns About Tolerance and Free Speech Δ1.69

A man waving a Palestinian flag climbed the Big Ben tower at London's Palace of Westminster early on Saturday, with local media reporting he shouted "free Palestine".The incident highlights the complexities of free speech versus intolerance in public spaces. Authorities are working to resolve the situation while ensuring public safety. The event has sparked debate about the limits of expression and the role of law enforcement in maintaining social order.

Human Rights Abused: Governments Exploit Vulnerabilities to Silence Critics Δ1.69

Amnesty International has uncovered evidence that a zero-day exploit sold by Cellebrite was used to compromise the phone of a Serbian student who had been critical of the government, highlighting a campaign of surveillance and repression. The organization's report sheds light on the pervasive use of spyware by authorities in Serbia, which has sparked international condemnation. The incident demonstrates how governments are exploiting vulnerabilities in devices to silence critics and undermine human rights.

Threats at Transportation Hubs Pose National Security Concerns. Δ1.69

Police evacuated Vienna's main train station on Monday over an unspecified threat, halting rail traffic before giving the all clear around 90 minutes later. The police did not describe the threat, but some Austrian media said it was a bomb threat, echoing a series of empty bomb threats in Austria last year that prompted the clearing of larger stations and delays to train traffic. National rail company OBB warned continued delays and cancellations were expected as the station reopened.

Women's Rights Under Attack and 'We Must Fight Back', Says UN Chief Δ1.69

The United Nations Secretary-General has warned that women's rights are under attack, with digital tools often silencing women's voices and fuelling harassment. Guterres urged the world to fight back against these threats, stressing that gender equality is not just about fairness, but also about power and dismantling systems that allow inequalities to fester. The international community must take action to ensure a better world for all.

Lenovo Unveils AI Display with Discrete NPU to Ease Privacy Concerns Δ1.69

Lenovo's proof-of-concept AI display addresses concerns about user tracking by integrating a dedicated NPU for on-device AI capabilities, reducing reliance on cloud processing and keeping user data secure. While the concept of monitoring users' physical activity may be jarring, the inclusion of basic privacy features like screen blurring when the user steps away from the computer helps alleviate unease. However, the overall design still raises questions about the ethics of tracking user behavior in a consumer product.

UK Quietly Scrubs Encryption Advice From Government Websites Δ1.68

The U.K. government has removed recommendations for encryption tools aimed at protecting sensitive information for at-risk individuals, coinciding with demands for backdoor access to encrypted data stored on iCloud. Security expert Alec Muffet highlighted the change, noting that the National Cyber Security Centre (NCSC) no longer promotes encryption methods such as Apple's Advanced Data Protection. Instead, the NCSC now advises the use of Apple’s Lockdown Mode, which limits access to certain functionalities rather than ensuring data privacy through encryption.