Cyber security news February 2025
This posting is here to collect cyber security news in February 2025. I post links to security vulnerability news to comments of this article. You are also free to post related links to comments. →
This posting is here to collect cyber security news in February 2025. I post links to security vulnerability news to comments of this article. You are also free to post related links to comments. →
Bad design refers to design that fails to meet user needs effectively which results in a poor user experience. Maggie Weber has made a set of interesting and funny Bad Design videos. Here are links to some of them: Fonts matter! https://www.facebook.com/share/r/15sGYFDFFi/ Who designed this? https://www.facebook.com/share/r/14uCkmwfLp/ What the sign says https://www.facebook.com/share/r/161vrobxDo/ Don’t buy AI https://www.facebook.com/share/r/19npdqJsKL/ →
AI is developing all the time. Here are some picks from several articles what is expected to happen in AI and around it in 2025. Here are picks from various articles, the texts are picks from the article edited and in some cases translated for clarity. AI in 2025: Five Defining Themes https://news.sap.com/2025/01/ai-in-2025-defining-themes/ Artificial intelligence →
Happy birthday TCP/IP! We ACKNOWLEDGE you. Transmission Control Protocol. Internet Protocol. The deployment of TCP was the birth of the modern Internet — it was the same protocol still in use today. But before TCP, IP networks still had a standard way to communicate: NCP, Network Control Program. It was warty and problematic and limited, →
This posting is here to collect cyber security news in January 2025. I post links to security vulnerability news to comments of this article. You are also free to post related links to comments. →
Here is collection of some cyber security trends and predictions for 2025 from various sources: Pimeän verkon keskustelut paljastavat: Tällaista kyytiä on luvassa vuonna 2025 Keskustelut paljastavat ensi vuoden uhkakuvat. https://www.is.fi/digitoday/tietoturva/art-2000010908617.html VPN provider NordVPN has partnered with researchers at NordStellar to predict the cyber threats of 2025. The companies analyzed the largest dark web forums →
Finland seized an oil tanker after the latest in a series of disruptions to undersea power and telecom infrastructure. Four telecommunication cables connecting Finland out of service. Finnish authorities board a ship in the Baltic Sea that the West suspects is linked to Russia, a day after an underwater Finland-Estonia electricity cable was cut and →
Bad design: Christmas https://youtu.be/lhOhXLBC1_A?si=OWBHd5Yaf34WUzS7 →
The entire modern computer market would probably never have been born, at least in the way we know it, without the processor, Intel 8080, published 50 years ago. The Intel 8080 (“eighty-eighty”) is the second 8-bit microprocessor designed and manufactured by Intel. It first appeared in 1974. The 8080 was not yet an x86 processor, →
Velleman LABORATORY POWER SUPPLY (0-30 VDC + 5 VDC + 12 VDC) WITH ANALOGUE DISPLAY PS603 Specifications: input voltage: 230 Vac ± 10 % output voltage: 0-30 Vdc / 12 Vdc / 5 Vdc corrente de saída: 3 A / 1 A / 1 A limited current: 10 mA – 3.2 A / 1.2-1.6 A →