Tech News

Upgrades core technology and looks to AI for efficiency gains. Source
Accused of hitting hospitals, schools and businesses. Source
Arriving 11 months after the second generation of the model. Source
Vulnerability in third-party identity verification system was exploited. Source
Contacting customers with affected handsets. Source
Adopts "facets" of a blueprint for network flexibility and monetisation. Source
Three-phased rollout amid larger digital shift. Source
More spend and better procurement guidance. Source
Exploring the possibility of homegrown debris research community. Source
CISO warns sharing logs would violate security protections. Source