❌

Normal view

There are new articles available, click to refresh the page.
Yesterday β€” 5 December 2025Main stream
Before yesterdayMain stream

Your Google Drive is a disasterβ€”here's how to fix it in just one afternoon

2 December 2025 at 08:15

Google Drive is a storage solution, but most of us treat it like a digital junk drawer. Files end up in random folders, duplicates stack up, and finding anything becomes a pain. The good news? With a bit of cleanup, you can sort out the clutter and tidy up your storage in just one afternoon.

Tired of AI slop? This tool rewinds the internet to pre-ChatGPT era

28 November 2025 at 13:06

Slop Evader is a new browser extension that filters your search results to a pre-AI era of the internet. By cutting off content published after 2022, it removes much of today’s AI-generated noise and brings real, human content back into focus.

The post Tired of AI slop? This tool rewinds the internet to pre-ChatGPT era appeared first on Digital Trends.

Why should I pay for a password manager?

29 November 2025 at 09:30

Are you on the fence about paying for a password manager? Let me help you out: pay for one. I’ve used quite a few password managers over the years, including the one built into my browser. I’ve happily paid for 1Password for nearly a decade, and would have it no other way.

Dark Web Job Market Evolved – Prioritizes Practical Skills Over Formal Education

21 November 2025 at 06:06

The underground labor market has undergone a significant transformation. According to new research analyzing 2,225 job-related posts collected from shadow forums between January 2023 and June 2025. The dark web job market now emphasizes practical skills and real-world experience over traditional credentials, marking a notable shift from previous patterns and reflecting broader global employment trends.​ […]

The post Dark Web Job Market Evolved – Prioritizes Practical Skills Over Formal Education appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

DoD failing to address growing security threats posed by publicly available data

A government watchdog is sounding the alarm about a growing national security threat online. Rather than a traditional cyberattack, however, this one comes from the everyday digital footprints service members and their families leave across the internet.Β 

A new Government Accountability Office report warns that publicly accessible data β€” from social media posts and location tracking to Defense Department press releases β€” can be pieced together by malicious actors to identify military personnel, target their families and disrupt military operations.

According to GAO, while the Pentagon has taken some steps to address the threat, its efforts remain scattered, inconsistent and lack coordination.Β 

β€œWe found that the department recognized that there were security issues, but they weren’t necessarily well-prepared to respond to them because it was new, because it didn’t necessarily neatly fit into existing organizational structures or policies or doctrines, and that’s a consistent story with the department,” Joe Kirschbaum, director of the defense capabilities and management team at GAO, told Federal News Network.Β 

To understand the risks posed to DoD personnel and operations that come from the aggregation of publicly accessible digital data, the watchdog conducted its own investigation and built notional threat scenarios showing how that information could be exploited. GAO began by surveying the types of data already available online and also assigned investigators to scour the dark web for information about service members.Β 

In addition to basic social media posts, investigators found data brokers selling personal and even operational information about DoD personnel and their families β€” information that can be combined with other publicly available data to build a more complete profile.Β 

β€œOnce you start putting some of these things together, potentially, you start to see a pattern β€” whether it’s looking at individuals, whether it’s the individuals linked to military operational units or operations themselves, family members. Nefarious actors can take these things and build them into a profile that could be used for nefarious purposes,” Kirschbaum said.Β 

One of GAO’s threat scenarios shows how publicly accessible information can expose sensitive military training materials and capabilities. Investigators found that social media posts, online forums and dark-web marketplaces contained everything from military equipment manuals, detailed training materials, and photos of facility and aircraft interiors. When combined, these digital footprints can reveal information about equipment modifications, strategic partnerships or potential vulnerabilities, which can be used to clone products, exploit weaknesses or undermine military operations.Β 

And while DoD has identified the public accessibility of digital data as a β€œreal and growing threat,” GAO found that DoD’s policies and guidance are narrowly focused on social media and email use rather than the full range of potential risks from aggregated digital footprints.Β 

For instance, the DoD chief information officer has prohibited the use of personal email or messaging apps for official business involving controlled unclassified information. But that policy doesn’t address the use of personal accounts on personal devices for unofficial tasks involving unclassified information β€” such as booking travel, accessing military travel orders, or posting on social media β€” activities that can pose similar risks once aggregated.

In addition, DoD officials acknowledged that current policies and guidance do not fully address the range of risks created by publicly accessible digital information about DoD and its personnel. They said part of the challenge is that the department has limited authority to regulate actions of DoD personnel and contractors outside of an operational environment.

β€œIn general, except for the operation security folks, the answer was they didn’t really consider this kind of publicly available information in their own sphere. It’s not like they didn’t recognize there’s an issue, but it was more like, β€˜Oh yeah, that’s a problem. But I think it’s handled in these other areas.’ Almost like passing the buck. They didn’t understand, necessarily, where it was handled. And the answer was, it should probably be handled collectively amidst this entire structure,” Kirschbaum said.Β 

The officials also said that while they had planned to review current policies and guidance, they β€œhad not collaborated to address digital profile risks because they did not believe the digital profile threat and its associated risks aligned with the Secretary of Defense’s priorities,” including reviving warrior ethos, restoring trust in the military and reestablishing deterrence by defending the homeland.Β 

β€œOne of our perspectives on this is we know we’re not sure where you would put this topic in terms of those priorities. I mean, this is a pretty clear case where it’s a threat to the stability and efficacy of our military forces. That kind of underlines all priorities β€” you can’t necessarily defend the homeland with forces that have maybe potential operational security weaknesses. So it would seem to kind of undergird all of those priorities,” Kirschbaum said.Β 

β€œWe also respect the fact that as the department’s making tough choices, whether it’s concentrations of policy, financial and things of that nature, they do have to figure out the most immediate ways to apply dollars. For example, we’re asking the department to look across all those security disciplines and more thoroughly incorporate these threats in that existing process. The extent they’re going to have to make investments in those, they do have to figure out what needs to be done first and where this fits in,” he added.

GAO issued 12 recommendations to individual components and agency heads, but at its core, Kirschbaum said, is the need for the department to incorporate the threat of publicly available information into its existing structure.Β 

β€œIn order to do that, we’re asking them to use those existing structures that they do have, like the security enterprise executive committee, as their collaborative mechanism. We want that body to really assess where the department is. And sometimes they’re better able to identify exactly what they need to do, rather than us telling them. We want them to identify what they need to do and conduct those efforts,” he said.

The post DoD failing to address growing security threats posed by publicly available data first appeared on Federal News Network.

Β© The Associated Press

Signal app on a smartphone is seen on a mobile device screen Tuesday, March 25, 2025, in Chicago. (AP Photo/Kiichiro Sato)
❌
❌