Search results
1 – 8 of 8These standards can help customers differentiate between service providers and ensure that data are stored in regions where data protection legislation and law enforcement access…
Details
DOI: 10.1108/OXAN-DB283985
ISSN: 2633-304X
Keywords
Geographic
Topical
These routers can compromise US critical infrastructure. This indicates that Chinese cyber operations are shifting from espionage to disruption.
Details
DOI: 10.1108/OXAN-DB285284
ISSN: 2633-304X
Keywords
Geographic
Topical
It said that it believes that state-sponsored attackers were remotely trying to compromise the iPhones associated with their Apple IDs. That warning revived discussions on the…
Details
DOI: 10.1108/OXAN-DB283381
ISSN: 2633-304X
Keywords
Geographic
Topical
This leak included corporate documents and internal communications, and detailed a suite of spyware applications developed by Shanghai-based cybersecurity company I-Soon, a…
Details
DOI: 10.1108/OXAN-DB285558
ISSN: 2633-304X
Keywords
Geographic
Topical
The attack exposed significant vulnerabilities in the global market for US Treasuries. It also signals that Chinese organisations, especially those that do business in the United…
Details
DOI: 10.1108/OXAN-DB283591
ISSN: 2633-304X
Keywords
Geographic
Topical
The changes follow complaints from the government about the content generated by Gemini on some of Prime Minister Narendra Modi’s policies. While election-related disinformation…
Details
DOI: 10.1108/OXAN-DB285829
ISSN: 2633-304X
Keywords
Geographic
Topical
Vladimir Putin is almost certain to run and win, keeping him in power for at least six more years. Neither the war with Ukraine, nor an inflation-strained economy, are likely to…
Details
DOI: 10.1108/OXAN-DB283426
ISSN: 2633-304X
Keywords
Geographic
Topical
These include border surveillance, human intelligence and Pyongyang-Hamas links. Joint live-fire exercises with US forces on October 25-27 were billed as targeting “large-scale…