Articles

  • 3 weeks ago | cpomagazine.com | Scott Ikeda

    A photo ID, and possibly even a biometric selfie, may be required to use the Google and Apple app stores in Texas next year. The Texas App Store Accountability Act, recently signed into law by Gov. Greg Abbott, gives the big tech players the remainder of 2025 to figure out how they will implement age verification to prevent children from accessing potentially harmful content. The app store law is the second of its type in the US, behind a similar regulation passed in Utah in March.

  • 3 weeks ago | cpomagazine.com | Scott Ikeda

    T-Mobile wants its new T-Life app to be the central management hub for customers, but those that use it apparently have to deal with undisclosed screen recording. For what the company says is “a smoother experience” and troubleshooting use, the app periodically grabs screenshots without warning or notifying the user. Users can turn the feature off in the app’s settings, but it is on by default and their attention is not drawn to it as part of the normal install or use process.

  • 3 weeks ago | cpomagazine.com | Scott Ikeda

    Philippines-based Funnull Technology, along with one of its administrators, has been hit with Office of Foreign Assets Control (OFAC) sanctions for its role as a knowing infrastructure provider for hundreds of thousands of malicious sites engaging in cyber scams.

  • 3 weeks ago | cpomagazine.com | Scott Ikeda

    Microsoft OneDrive users may have unwittingly provided hundreds of apps with access to the full contents of their cloud storage, according to a new research report from Oasis Security. The researchers found a security flaw in OneDrive File Picker that grants apps access to any and all files in the account when the user grants permission for just one file upload, with the language governing this process cited as too “vague” and “unclear” to communicate what is actually happening.

  • 1 month ago | cpomagazine.com | Scott Ikeda

    New AI data security guidelines approved by the Cybersecurity and Infrastructure Security Agency (CISA), National Security Agency’s Artificial Intelligence Security Center (NSA AISC), and Federal Bureau of Investigation (FBI) have been issued and are aimed at assisting organizations of all types that intend to (or already) handle AI training data. The paper goes into detail on a variety of ways that training data may become compromised, including active targeting by attackers.

Contact details

Socials & Sites

Try JournoFinder For Free

Search and contact over 1M+ journalist profiles, browse 100M+ articles, and unlock powerful PR tools.

Start Your 7-Day Free Trial →