QR code phishing surges 146% as Microsoft detects and analyzes 8.3 billion phishing threats in Q1 2026 β attackers are changing tactics to bypass security TechRadar - All the latest technology news By:benedict.collins@futurenet.com (Benedict Collins) 1 May 2026 at 20:05 Microsoft has seen attackers changing tactics to get around security tools, and they keep adapting even when disrupted.
Error in Medicare database exposes US healthcare providers Social Security numbers β Trump administration directory designed to modernize Medicare encounters another setback TechRadar - All the latest technology news By:benedict.collins@futurenet.com (Benedict Collins) 1 May 2026 at 18:30 A Trump administration directory designed to help seniors find healthcare inadvertently exposed Social Security numbers.
Google says it is βproudβ to serve the Pentagon β new DoD contract expansion says Gemini will only be used for βany lawful purposeβ, but what happened to 'Donβt Be Evil'? TechRadar - All the latest technology news By:benedict.collins@futurenet.com (Benedict Collins) 1 May 2026 at 02:10 Google's contract with the Pentagon allows the DoD to use Gemini for 'any lawful purpose', and that is a big ethical concern.
'The Internet is falling down': Critical cPanel CRLF injection vulnerability puts tens of millions of websites at risk of total compromise β hosting providers urged to apply CVE-2026-41940 patch immediately TechRadar - All the latest technology news By:benedict.collins@futurenet.com (Benedict Collins) 30 April 2026 at 20:05 A new critical severity vulnerability can give attackers full control over WHM servers, allowing them to steal data, upload malware, and delete websites.
Researchers discover new all-in-one βBluekitβ phishing kit capable of bypassing enterprise 2FA protocols and emulating 40+ global brands TechRadar - All the latest technology news By:benedict.collins@futurenet.com (Benedict Collins) 30 April 2026 at 19:20 Bluekit centralizes and automates entire phishing campaigns, and is capable of stealing sessions, avoiding detection, and spoofing locations.