News

Microsoft 365 and Google Workspace could put sensitive data at risk because of a blind spot in default email behavior - Tuesday, July 1, 2025 - 16:32
  • Experts warn emails sent with sensitive data are still getting delivered unencrypted, and no one gets notified
  • Microsoft 365 sends email in plain text when encryption fails, without alerting the user at all
  • Google Workspace still uses insecure TLS 1.0 and 1.1 without warning senders or rejecting messages

Most users assume that emails sent through cloud services are encrypted and secure by default, but this might not always be the case, new research has claimed.

A report from Paubox found Microsoft 365 and Google Workspace both mishandle these failures in ways that leave messages exposed, without notifying the sender or logging the failure.

“Using obsolete encryption provides a false sense of security because it seems as though sensitive data is protected, even though it really is not,” Paubox said.

Default settings quietly undermine encryption

The problem isn’t just a technical edge case; it stems from how these platforms are designed to operate under common conditions.

Google Workspace, the report found, will fall back to delivering messages using TLS 1.0 or 1.1 if the receiving server only supports those outdated protocols.

Microsoft 365 refuses to use deprecated TLS, but instead of bouncing the email or alerting the sender, it sends the message in plain text.

In both cases, the email is delivered, and no warning is issued.

These behaviors pose serious compliance risks, as in 2024, Microsoft 365 accounted for 43% of healthcare-related email breaches.

Meanwhile, 31.1% of breached healthcare entities had TLS misconfigurations, despite many of these organizations using “force TLS” settings to meet compliance requirements.

But as Paubox notes, forcing TLS does not guarantee encryption using secure versions like TLS 1.2 or 1.3, and fails silently when those conditions are not met.

The consequences of silent encryption failures are far-reaching - healthcare providers routinely send Protected Health Information (PHI) over email, assuming tools like Microsoft 365 and Google Workspace offer strong protections.

In reality, neither platform enforces modern encryption when failures occur, and both risk violating HIPAA safeguards without detection.

Federal guidelines, including those from the NSA in the US, have long warned against TLS 1.0 and 1.1 due to vulnerabilities and downgrade risks.

Yet Google still allows delivery over those protocols, while Microsoft sends unencrypted emails without flagging the issue.

Both paths lead to invisible compliance failures - in one documented breach, Solara Medical Supplies paid more than $12 million after unencrypted emails exposed over 114,000 patient records.

Cases like this show why even the best FWAAS or ZTNA solution must work in concert with visible, enforceable encryption policies across all communication channels.

“Confidence without clarity is what gets organizations breached,” Paubox concluded.

You might also like
This tiny NAS can store up to 32TB of super-fast SSD data and even comes with a VPN server and a 4K HDMI port - Tuesday, July 1, 2025 - 17:12
  • Streams 4K video, backs up your phone, and still skips cloud storage entirely
  • The TerraMaster F4 SSD promises home privacy, but may offload all maintenance responsibility onto the user
  • Up to 32TB of SSD speed sounds impressive, but your router might bottleneck it

As local storage continues to evolve, some brands now offer compact network-attached systems that emphasize privacy, speed, and media versatility.

The TerraMaster F4 SSD provides support for up to 32TB of SSD storage using four 8TB SSDs, and supports file systems such as EXT4, BTRFS, exFAT, and NTFS.

It bypasses the need for cloud-based platforms by incorporating hardware-level encryption and data segregation for over 20 user accounts.

Performance metrics meet household use cases

The device is powered by a quad-core ARM-based Rockchip RK3568 processor clocked at up to 2.0GHz, with hardware decoding support for H.264 and H.265 codecs and resolutions up to 4K@60fps.

It also features 8GB of DDR4 RAM, expandable to 32GB using two SODIMM slots.

Network capabilities include a 2.5GbE port and a 10Gbps USB 3.2 Gen 2 Type-C interface, while HDMI 2.0 offers 4K display output.

TerraMaster F4 SSD can also stream to TVs and tablets using standard protocols like uPnP and DLNA, and support for media servers such as Plex, Jellyfin, and Emby suggests it will be compatible with the majority of home setups.

The F4 SSD is built around a 5G Ethernet port, reportedly offering speeds up to five times faster than standard Gigabit connections, supporting high-throughput scenarios.

However, in practical terms, users will likely be limited by the speed of their broader home network, not just the NAS hardware.

Software features include backup tools (including cloud sync and snapshot), AI photo management, VPN server, and remote access via TNAS.online, which enables downloads and uploads through the cloud.

Security features include TRAID, a flexible array system that optimizes space while providing redundancy.

It also supports RAID 0/1/5/6/10, JBOD, and includes tools such as S.M.A.R.T., bad block scan, SSD trim, and hot spare management.

TerraMaster’s SPC control system is another layer that restricts app access based on verified permissions.

The F4 SSD also allows bi-directional syncing with cloud platforms like Google Drive and Dropbox.

This hybrid capability, while useful, may seem counterintuitive in a product designed to replace cloud reliance.

The NAS also features tool-free SSD installation with a drawer-style enclosure, making drive upgrades accessible to beginners.

Cooling is handled by a quiet convection fan system, reportedly keeping standby noise around 19dB, like the TerraMaster D4 SSD. Such silence may be beneficial in noise-sensitive environments like home studios or bedrooms.

The system operates on TOS 6.0 and supports up to 128 user accounts, 128 user groups, and 8 shared folder sync tasks.

This makes it suitable for advanced home users or small studios needing high-speed, private data access.

The TerraMaster F4 SSD is ambitious in scope, but its value will depend on whether users make full use of its features.

Via TechPowerUp

You might also like
Calling All Console Cowboys: Apple TV Plus Just Dropped the First Teaser for 'Neuromancer' - Tuesday, July 1, 2025 - 18:49
After 41 years, the classic sci-fi novel is finally coming to life in a new TV show.
What Happens to Your Brain When You Use ChatGPT? Scientists Took a Look - Tuesday, July 1, 2025 - 20:02
An MIT study found that using gen AI to write an essay kind of defeated the purpose of writing an essay.
Is AI the new cloud? Survey reveals companies scrambling to adopt AI - but few really know what impact it will have - Tuesday, July 1, 2025 - 20:28
  • Report finds business AI adoption is exploding, but most companies are skipping the hard work of preparation
  • Leadership teams are failing to align on AI priorities, leaving strategies fractured and confused
  • AI is only as good as the data behind it, and most data strategies are missing

The surge in artificial intelligence adoption has sparked comparisons to the cloud boom of the past decade, but while usage is growing rapidly, understanding remains shallow, new research has claimed.

A Hostinger report found almost 80% of companies now use or plan to use AI, but a seperate Adecco Group report claims only 10% of C-suite leaders believe their organizations are fully ready for the disruption AI brings.

Among the estimated 359 million companies worldwide, about 280 million now integrate AI into at least one function.

AI adoption accelerates, but strategy and structure lag behind

A growing number of small businesses are turning to the best AI tools to handle tasks like writing emails, analyzing data, or generating content.

Larger companies may build out full teams for implementation, but smaller firms are quietly transforming operations using lean, sometimes improvised, approaches.

Still, readiness doesn’t follow adoption, and there is a worrying gap in strategy, as although 60% of leaders expect workers to update their skills, 34% of companies have no formal AI policy.

Adecco found over half of CEOs admit their teams struggle to align on priorities, and only a third of businesses are investing in data infrastructure that would help close these gaps.

However, a small group of “future-ready” companies is building more responsive strategies by supporting continuous learning and relying on enterprise-wide insight to shape their AI direction.

Adecco’s CEO, Denis Machuel, puts it plainly: “AI-driven transformation must be human-centric.”

Many companies rush into AI adoption without understanding what differentiates them, resulting in scattered or redundant projects.

“Without enterprise-wide insight, AI efforts become siloed and misaligned. Enterprise Architecture can help focus AI initiatives on what truly sets a company apart,” Stendera explains.

By mapping their unique strengths and workflows, organizations can guide AI deployments that reinforce strategic priorities rather than dilute them.

AI depends not just on investment, but on introspection, and it is not a magic fix - and if companies do not understand what they need from AI, they won’t know how to use it, and the result will be catastrophic.

You might also like
Today's NYT Mini Crossword Answers for Wednesday, July 2 - Tuesday, July 1, 2025 - 23:37
Here are the answers for The New York Times Mini Crossword for July 2.
Let's Talk About the 'Ironheart' Finale and Post-Credits Scene - Wednesday, July 2, 2025 - 00:00
Marvel did its Marvel thing again.
Best Internet Providers in Utah - Wednesday, July 2, 2025 - 02:39
Looking for reliable internet service in Utah? Here are the top picks from our broadband experts.
Refi Rates Drop Over the Last Week: Mortgage Refinance Rates on July 2, 2025 - Wednesday, July 2, 2025 - 04:00
Multiple important refinance rates are lower. Refinancing makes sense if you can get a lower interest rate on your home loan.
Mortgages Cool Off for Homeseekers: Today's Mortgage Rates on July 2, 2025 - Wednesday, July 2, 2025 - 04:05
Quite a few key mortgage rates moved down. Will rates continue to trend downward in 2025?
Want to Slash Your Electric Bill This Summer? Make These 6 Small Changes First - Wednesday, July 2, 2025 - 06:00
Stay comfortable this summer by trying these budget-friendly cooling tips at home.
Intelligent observability is THE critical tool for hybrid IT management - Wednesday, July 2, 2025 - 04:03

Modern IT systems are awash with a constant flow of data providing information on system performance and security. This data is crucial for IT professionals looking to keep IT infrastructures running smoothly.

The snag is, with so much information available, it’s almost impossible to decipher what’s routine and what potentially could pose a threat. Trying to figure out the digital wheat from the chaff requires more than just visibility. It requires increasingly sophisticated systems that can interpret, prioritize and act—not simply collect information.

Unfortunately, most observability tools today don’t work this way. They generate alerts, log events and surface anomalies. And while technology is improving all the time, they don’t always understand what’s happening or how to respond.

Take a typical global enterprise running a hybrid architecture. It may have critical applications that are spread across multiple cloud providers, while also relying on on-premise legacy systems. Together, these systems are shepherded by dozens of monitoring tools generating thousands of alerts every day.

Some are false positives. Others are minor policy breaches. But lurking somewhere in the noise is a genuine security incident. And by the time it’s spotted… well, it could be too late.

Observability is becoming more intelligent

What’s missing isn’t just more tools or greater visibility. It requires a new, highly sophisticated level of observability—one that works more like a human brain with the ability to filter out noise, recognize what matters and trigger the right response at the right time. What’s needed is something intelligent that can ’think’ for itself.

Part of the reason why this is needed is because IT teams have tended to invest in separate tools that often have little contextual awareness. That means it’s up to the human members of IT teams to bridge the gaps, deciding whether an alert is serious, identifying the root cause and initiating the right response. In fast-moving environments, these human assessments can take time which, in turn, adds to the risk.

An intelligent observability system, on the other hand, would do more than simply monitor for known issues. It would detect anomalies in real time using context-aware monitoring, then assess the severity and likely impact based on both the technical and business relevance and risk.

Rather than treating every signal the same, it would prioritize based on urgency and risk, helping teams focus on what truly matters.

Crucially, it would also support automation, enabling routine fixes or containment measures to be initiated. And instead of splitting insight across multiple disconnected views, it would bring together data from on-premises and cloud environments in a single, cohesive picture.

This kind of system doesn’t just monitor IT systems and networks. It has total oversight and is ready to act when needed.

So, how close are we?

The good news is that progress is being made. AI-driven observability is moving from aspiration to implementation. Anomaly detection based on behavioral baselines is becoming more accessible, helping teams distinguish real issues from false alarms. Alert correlation and intelligent escalation paths are improving, reducing alert fatigue and bringing the right signals to the right people at the right time.

Some observability platforms, including those being developed at SolarWinds, are already combining monitoring, analysis and response into more cohesive workflows. Integration across hybrid environments remains a challenge, but the building blocks for intelligent observability are now in place.

What’s still missing, though, is the kind of full-system intelligence that can replicate the nuance of human decision-making. Most observability tools still rely on thresholds, templates, or predefined rules. True context-awareness—the ability to understand why something is happening and what to do next—is still emerging. But the direction of travel is clear.

Why this matters now

According to a recent SolarWinds AI and Observability report focused on the public sector, three-quarters of respondents said hybrid environments were hard to manage. Top concerns included data protection, integration complexity and a lack of visibility across systems.

Managing this complexity is made harder by the reality that observability tools are often siloed—one for cloud, another for on-prem, with separate platforms for detection, logging and remediation.

Security only adds to the unpredictability. In the same report, more than half of IT professionals said insider mistakes were contributing to serious threats, while 59% highlighted increasingly sophisticated attacks from external actors. The rise of generative AI means those external threats are becoming more scalable and targeted, increasing the strain on overstretched IT teams.

Which is why the key is not to add even more tools but to reduce complexity, improve visibility and act with intelligence and speed. An observability system that functions more like a brain does exactly that, because IT systems need to do more than observe. They need to understand.

We list the best small and medium business (SMB) firewall software.

This article was produced as part of TechRadarPro's Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro

Ironheart ending explained: who is [spoiler], will there be a season 2, and more big Marvel questions answered - Wednesday, July 2, 2025 - 04:32

Full spoilers immediately follow for Ironheart.

Ironheart has disengaged its thrusters. Its final three episodes landed on July 1 or 2 (depending on where you live), with the trio's arrival marking the end of the Marvel TV show's run on Disney+.

Or does it? The last Marvel Phase 5 project's finale is full of unresolved plot threads that suggest Riri Williams (Dominique Thorne) and Parker Robbins' (Anthony Ramos) stories have only just begun in the Marvel Cinematic Universe (MCU). Throw in the debut of a long-awaited Marvel villain and other interesting tidbits that might impact the MCU moving forward, and Ironheart could be more important to the MCU than we realized.

But enough babbling. Let's take a look at the biggest questions you have about Ironheart's ending and I'll do my best to answer them.

Who plays Mephisto in Ironheart? And what is he, exactly?

The demon lord known as Mephisto in Marvel Comics has finally made his MCU debut (Image credit: Marvel Studios/Disney+)

Let's address the second question first because it's easier to answer: Mephisto is played by Sacha Baron Cohen – he of Borat, Ali G, and The Trial of the Chicago 7 fame – in the MCU.

Cohen's appearance won't shock some MCU devotees. He was first linked with the role of Mephisto in October 2022 – those reports arriving 18 months after Marvel fans had convinced themselves Mephisto would be unveiled as primary antagonist of WandaVision. As it happened, Agatha Harkness was that show's Big Bad. Nonetheless, fans have longed for the day that Mephisto would finally make his bow in Marvel's cinematic juggernaut.

As for who (or what) Mephisto is: he's Marvel Comics' takes on Mephistopheles, the demon lord who appears in the Germanic fable Faust. Mephisto is also an alias of The Devil, aka the mythical personification of evil who lauds it over the realm known as Hell in many religions.

Mephisto's true form can be seen in a easily-missed shot when he taps a teaspoon on the side of a cup of coffee (Image credit: Marvel Studios/Disney+)

But back to Marvel's take on Mephisto. First introduced in comic book 'Silver Surfer #3' in December 1968, the demonic entity is a recurring adversary of The Silver Surfer, Ghost Rider, and Spider-Man in Marvel literature, although he's also crossed paths with Doctor Strange, Doctor Doom, Scarlet Witch, and myriad other Marvel heroes and villains.

He's most famous for being responsible for the demise of Peter Parker and Mary Jane Watson's marriage, too. Indeed, in the incredibly divisive 2000s comic story 'Spider-Man: One More Day', Mephisto made a deal with the pair to save Aunt May's life in exchange for the formal union of their love, which infuriated long-time fans of the webslinger.

Abilities wise, Mephisto is unsurprisingly one of the most powerful beings in the Marvel Universe. He possesses all of the usual superhuman powers, but it's his ability to shapeshift, foresee events before they transpire, and prey on people's biggest fears and/or their trauma that makes him such a threat.

It's the latter of those skills, coupled with his vast magical powers, that enables him to warp reality, and to manipulate people and bargain with them for something they want. Usually, the trade-off is the other individual's soul, which Mephisto takes ownership of once a deal is formally agreed.

Okay, so what's the deal with him first appearing in Ironheart? He's the individual who rescues Parker Robbins after the latter and Cousin John's unsuccessful break-in at the home of Parker's dad. Then, he convinces Parker to strike a deal: Mephisto will gift him a dark magic-infused hooded cloak – so Parker can commit petty crimes and make himself rich – in exchange for Parker's soul.

Who dies in Ironheart?

Ironheart performs the rare feat of bringing someone back from the dead (Image credit: Marvel Studios/Disney+)

Nobody. The eponymous hero survives, as do Anthony Ramos' villain in Parker Robbins/The Hood and Alden Ehrenreich's secondary antagonist Zeke Stane.

In fact, Ironheart pulls a reverse Uno card, and brings someone back from the dead. After she defeats The Hood by taking away the source of his powers (aka his cloak), Riri heads for the exit of Desperito's, aka the dilapidated pizza restaurant that The Hood turned into his hideout.

On the way, though, she bumps into Mephisto, who cajoles her into becoming his next victim. Mephisto makes a deal with Riri to revive Natalie Washington (Lyric Ross). Remember, Natalie is Riri's best friend, who was killed in a drive-by shooting years ago, and who N.A.T.A.L.I.E, the artificial intelligence Riri creates, is based on.

In return, Mephisto gets Riri's soul. Indeed, after Riri shakes hands with Mephisto, we're privy to a highly emotional reunion between Riri and the reborn Natalie. However, as the pair hug, Riri's right forearm gets covered by the same fire-esque skin markings that adorned Parker's body every time he used his cloak and/or powers.

With Riri's soul now seemingly bound to Mephisto, it'll be fascinating to see when she realizes this is the case, and if her and/or Natalie sacrifice the latter's second chance at life to free Riri of the pact that this flawed hero has made.

Does Ironheart have a mid-credits or post-credits scene?

Parker and Zelma meet in Stanton's in Ironheart's mid-credits scene (Image credit: Marvel Studios/Disney+)

Yes and no. Ironheart has a mid-credits stinger, but there's no end-credits scene to stick around for.

Where the former is concerned, we see the now-cloakless Parker visit Stanton's. That's the confectionary shop that's a front for the Stanton family, who deal with the mystical and the occult.

Anyway, upon entering the store, Parker is greeted by Zelma Stanton (read my Ironheart cast and character guide for more on her), who rattles off the welcome spiel we first heard in episode 4. Parker, though, immediately sees through Zelma's facade, and informs her that he knows about the stuff in the back – i.e., the magical trinkets and knowledge in the Stantons' possession. Parker then tells Zelma he's looking for someone more "experienced" and "supreme" than she is before the screen cuts to black.

Clearly, Parker is interested in finding one of two individuals: Stephen Strange, aka Doctor Strange, or the current Sorcerer Supreme/Master of the Mystic Arts in MCU fan-favorite Wong. Considering that Strange is off-world dealing with the fallout from Doctor Strange 2, I suspect Parker wants to find Wong to learn more about magic. Will it be for the right reasons because he's turned over a new leaf in his life, or does he seek more knowledge of dark magic in order to exact revenge on Riri and Mephisto? Who knows – but this isn't the last we've seen of Parker.

Will there be an Ironheart season 2? And how could it set up Marvel's Strange Academy TV show?

I'd be surprised if Ironheart gets a second season (Image credit: Marvel Studios/Disney+)

We don't know. Unlike their big-screen offerings – read my articles on how to watch the Marvel movies in order and the best Marvel movies while you're here – Marvel rarely tells us if a show's lead character will return in a second season once its final end credits sequence has rolled. The only time I can remember the comic giant doing so was with season 1 of Loki, with a mid-credits stinger stating "Loki will return in season 2".

The Tom Hiddleston-starring series aside, Marvel has only renewed three other shows: Daredevil: Born Again, whose second season is currently in development, and animated offerings Your Friendly Neighborhood Spider-Man and What If...?. The former's sophomore season is also in active development, while the latter ran for three seasons between 2022 and 2024.

The chances of Ironheart season 2 being greenlit, then, aren't too high. Sure, its 86% critical score on Rotten Tomatoes suggest it should be, but its mixed audience rating indicates that general viewers wouldn't be devastated if a second season isn't forthcoming.

In my view, it's far more likely that Williams, Robbins, and/or Mephisto will show up in other MCU projects. Williams could be part of the cast for Marvel's long-rumored Young Avengers project. Based on Ironheart's mid-credits scene, Robbins could show up in another rumored Disney+ show called Strange Academy, which could star Benedict Wong's Sorcerer Supreme and explore the Mystic Arts in more detail. As for Mephisto, given his shared history with Spider-Man, would it be too much to ask for a cameo in Spider-Man: Brand New Day? Probably, but stranger things have happened.

You might also like
The Human Firewall: even with AI, humans are still the last line of defense in cybersecurity - Wednesday, July 2, 2025 - 05:03

Even with today’s vast arsenal of cybersecurity tools and AI-enhanced threat detection, attackers continue to succeed – not because the technology is failing, but because the human link in the defensive chain remains exposed. Cybercriminals almost always take the path of least resistance to execute a breach, which often means targeting people rather than a system.

According to McKinsey, a staggering 91% of cyberattacks have less to do with technology, and more to do with manipulating and taking advantage of human behavior. In other words, despite technologies like AI advancing at break-neck speed, cybercriminals are still more likely to hack people than machines.

From a cybercriminal’s perspective, this makes sense. It’s the path of least resistance. Why spend resources hacking your way through a high-tech, AI-secured front door when there’s an open window around the back? This isn’t news to CISOs – according to a 2024 IBM survey, almost three-quarters (74%) now identify human vulnerability as their top security risk. They’re aware of the open window, and now they’re trying to secure it.

Easier said than done

That’s easier said than done, however. Whether it’s a well-timed phishing email, a spoofed call, a deepfake video, or a barrage of authentic-seeming push notifications designed to wear down a user’s judgment, attackers are adapting faster than defenses can compensate.

The reality is that while security vendors race to outpace attackers with smarter algorithms and tighter controls, the tactics that most reliably lead to breaches are psychological, not technical. Threat actors are exploiting trust, fatigue, social norms, and behavioral shortcuts – tactics far more subtle and effective than brute-force code.

It’s not a lack of technology leaving organizations vulnerable to these techniques, it’s a lack of alignment between those tools and the way people actually think and operate. In fast-paced, high-pressure environments, employees don’t have the bandwidth to second-guess every request or scrutinize every prompt.

They rely on instincts, familiarity, and patterns they’ve learned to trust. But those very instincts are what attackers hijack, turning help desk tickets into access exploits, or mimicked CFOs into multi-million-dollar heists. As generative AI accelerates the realism and reach of these tactics, organizations face a critical question: not just how to keep the bad actors out, but how to better equip their people within. Because when breaches hinge on human decisions, cybersecurity isn’t just a technology issue – it’s a human one.

Trust, bias, and the psychology of security breaches

Human behavior is a vulnerability, but it’s also a predictable pattern. Our brains are wired for efficiency, not scrutiny, which makes us remarkably easy to manipulate under the right conditions. Attackers know this and design their exploits accordingly. They play on urgency to override caution, impersonate authority figures to disarm skepticism, and drip-feed small requests to trigger consistency bias. These tactics are ruthlessly calculated, and they work not because people are careless, but because they’re human.

In early 2024, a finance worker at a Hong Kong firm was tricked into transferring $25 million after attending a video call with what appeared to be the company’s CFO and other colleagues – each one a convincing AI-generated deepfake. The attackers used publicly available footage to clone faces and voices, creating a seamless illusion that exploited trust and familiarity with devastating effect.

The eye-opening part is that these deepfake tools are now readily available. Modern social engineering doesn’t rely on obvious red flags. The emails aren’t riddled with typos, and the impersonations don’t sound robotic. Thanks to generative AI, deepfake technology, and access to vast training data, attackers can now create incredibly convincing personas that mirror the tone, behavior, and language of trusted colleagues. In this environment, even the most well-trained employee can fall victim without fault.

Heuristics – mental shortcuts – are frequently exploited by attackers who know what to look for. “Authority bias” leads people to follow instructions from perceived leaders, like a spoofed email from a CEO. The “scarcity principle” ramps up pressure by creating false urgency, making employees feel they must act immediately.

And “reciprocity bias” plays on basic social instincts – once someone has received a seemingly benign gesture, they’re more likely to respond positively to a follow-up request, even if it’s malicious. What so often looks like a lapse in judgment is often just an expected outcome of cognitive overload and the common, everyday use of heuristics.

Where policy meets psychology

Traditional identity and access management (IAM) strategies tend to assume that users will behave predictably and rationally – that they’ll scrutinize every prompt, question every anomaly, and follow policy to the letter. But the reality inside most organizations is far messier. People work quickly, switch contexts constantly, and are bombarded with notifications, tasks, and requests.

If security controls feel too rigid or burdensome, users will find workarounds. If prompts are too frequent, they’ll be ignored. This is how good policy gets undermined – not out of negligence, but because the design of the system clashes with the psychology of its users. Good security mechanisms shouldn’t add friction; they should seamlessly guide users towards better choices.

Applying principles like Zero Trust, least privilege, and just-in-time access can dramatically reduce exposure, but only if they’re implemented in ways that account for cognitive load and context. Automation can help here: granting and revoking access based on dynamic risk signals, time of day, or role changes without requiring users to constantly make judgment calls.

Done right, identity management becomes an invisible safety net, quietly adapting in the background, rather than demanding constant interaction. Humans shouldn’t be removed from the loop, but they should be freed from the burden to catching what the system should already detect.

Building a security culture

Technology may enforce access policies, but culture determines whether people follow them. Building a secure organization has to be about more than simply enforcing compliance. That starts with security training that goes beyond phishing drills and password hygiene to address how people actually think and react under pressure. Employees need to recognize their own cognitive biases, understand how they’re being targeted, and feel empowered – not penalized – for slowing down and asking questions.

Equally important is removing unnecessary friction. When access controls are intuitive, context-aware, and minimally disruptive, users are more likely to engage with them properly. Role-based and attribute-based access models, combined with just-in-time permissions, help reduce overprovisioning without creating frustrating bottlenecks in the form of pop-ups and interruptions. In other words, modern IAM systems need to support and empower employees rather than make them constantly jump through hoops to get from one app or window to another.

The human firewall isn’t going anywhere

The biggest takeaway here is that cybersecurity isn’t just a test of systems, AI-driven or not – it’s a test of people. The human firewall is arguably an organization’s biggest weakness, but with the right tools and policies in place, it can become its greatest strength. Our goal should not be to eliminate human error or change the innate nature of humans, but to design identity systems that make secure behavior the default – easy, intuitive, and frictionless.

We list the best employee recognition software.

This article was produced as part of TechRadarPro's Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro

WhatsApp will now let big businesses voice call you directly, also adds more AI agents - Wednesday, July 2, 2025 - 05:29
  • WhatsApp Business now supports voice and video calls, and even in-message voice notes
  • AI agents suggest chat follow-ups and product recommendations
  • Meta claims 1.5 billion people use WhatsApp every single day

A series of new WhatsApp updates will make it even easier for businesses to communicate with their customers directly on the platform with the launch of voice calling features.

At its global Conversations conference, the company announced firms using the WhatsApp Business Platform will now be able to use more of the features everyday users have on the messaging platform, including receiving and making voice calls with customers and even sending and receiving voice messages.

Furthering this, customer service teams operating across sectors like remote healthcare can also make video calls on the platform in what could be seen as a huge update for the Business Platform.

Huge updates come to the WhatsApp Business Platform

At the same time, WhatsApp also confirmed it would be expanding its Business AI capabilities by introducing automated follow-ups and support via WhatsApp chats and rolling out product recommendations on merchant websites.

The company explained its new voice and video calling features not only improve current support, but "[pave] the way for AI-enabled voice support in the future."

(Image credit: Meta)

Finally, the social networking giant confirmed it would be centralizing its marketing and campaign management tools across other core platforms – Facebook and Instagram – to make it easier for companies to use shared creatives, budgets and flows across all three platforms.

Besides sharing resources across Facebook, Instagram and WhatsApp, businesses will "soon" be able to create ads for WhatsApp Statuses directly in Ads Manager to reach even more customers.

Already a popular business networking app for customer support in Brazil and India, WhatsApp is seeing healthy growth across other markets, now counting more than 200 million monthly Business users and 1.5 billion daily users in total.

The news comes just a couple of weeks after WhatsApp announced updates to its Channels, including paid subscriptions and the option for businesses to promote channels.

You might also like
Qantas reveals massive data breach - 6 million customers possibly affected, here's what we know - Wednesday, July 2, 2025 - 06:03
  • Unidentified threat actors target Qantas call center
  • This allows it to gain access to sensitive customer data
  • The attack is most likely the work of Scattered Spider, experts claim

Yet another major airlines has been hit by a major cyberattack after Qantas, the largest flight provider in Australia, confirmed it had been targeted

In a press release published on the company’s website, Qantas said it spotted the intrusion after a threat actor targeted a call center, and accessed a third-party customer servicing platform.

The name of the platform was not disclosed, but Qantas said six million customers have service records there.

Get 55% off Incogni's Data Removal service with code TECHRADAR

Wipe your personal data off the internet with the Incogni data removal service. Stop identity thieves
and protect your privacy from unwanted spam and scam calls.View Deal

Scattered Spider

“We are continuing to investigate the proportion of the data that has been stolen, though we expect it will be significant,” the press release reads.

“An initial review has confirmed the data includes some customers’ names, email addresses, phone numbers, birth dates and frequent flyer numbers.”

However, credit card details, personal financial information, and passport details, were not stolen, since these are not even held in this particular system. Therefore, passwords, PIN numbers, log in details, and frequent flyer accounts, remain uncompromised, the company confirmed.

Qantas also said the system is now contained, and that it notified relevant authorities, as well as affected individuals. The airline’s operations and safety were not endangered at any time.

The company did not say who the threat actors were, or if they tried to deploy any ransomware.

However the incident shares many similarities with other attacks recently made by the group known as Scattered Spider.

This group has not yet claimed responsibility for this attack - but in recent weeks, multiple reports have emerged of airlines being hit by cyberattacks, with Hawaiian Airlines confirmed suffering an attack and both WestJet and GlobalX suffering the same fate recently too.

Via BleepingComputer

You might also like
iPhone 17 Air leaked specs suggest it's likely to beat the S25 Edge in one key way – and lose out in another - Wednesday, July 2, 2025 - 06:14
  • The iPhone 17 Air will apparently be just 5.5mm thick
  • That's even slimmer than the Samsung Galaxy S25 Edge
  • However, it now looks very likely to only have one rear camera

The iPhone 17 Air is a rumored phone that – no matter what else might be good or bad about it – will in large part be judged on how slim it is. After all, being slim appears to be its entire USP. And on that front, it could be a success.

In a new YouTube video, FrontPageTech (via NotebookCheck) has claimed that the iPhone 17 Air will be just 5.5mm thick, which would make it even slimmer than the 5.8mm thick Samsung Galaxy S25 Edge. While that’s only a 0.3mm difference, this could still be a big win for Apple, since the S25 Edge would be this rumored phone’s main competitor, and is also sold on being slim.

Of course, we’d take this thickness claim with a pinch of salt, especially as FrontPageTech has a mixed track record. But lately they’ve been right more often than they’ve been wrong, and this leak is broadly in line with previous iPhone 17 Air leaks – though one puts it at a slightly slimmer 5.44mm and another at a marginally thicker 5.65mm. In all cases though, leaks suggest it will have Samsung’s rival phone beat on that front.

Compromised cameras and a Plus-level price

However, the iPhone 17 Air probably won’t have the Samsung Galaxy S25 Edge beat in every other way, as this latest leak – among many others – suggests the iPhone 17 Air will have just a single 48MP camera. That’s in contrast to a dual-lens camera on the S25 Edge, consisting of both a 200MP main sensor and a 12MP ultra-wide camera. So it seems Apple is probably prioritizing thinness over photography.

Other specs have also been leaked here, and again largely echo what we’ve heard before. This includes an A19 – but not A19 Pro – chipset, 12GB of RAM, and a 6.6-inch screen with a 120Hz refresh rate.

The video also highlights the battery, saying that Apple will use one with a silicon anode, in order to achieve a higher density than would otherwise be possible, and that this – coupled with an efficient modem and chipset – could mean the iPhone 17 Air will last almost as long as the base iPhone 17, despite the limited space for a battery.

Finally, the video touches on price, stating that the iPhone 17 Air will cost roughly the same amount as the iPhone 16 Plus – a phone that starts at $899 / £899 / AU$1,599. This too is in line with multiple previous leaks.

We should find out whether this is all correct or not in September, as that's when the iPhone 17 Air is expected to launch – alongside the rest of the iPhone 17 series.

You might also like
Google Messages now lets you edit texts you’re sending to iPhones, but there’s a serious catch - Wednesday, July 2, 2025 - 06:15
  • You can now edit texts sent from Android to iOS
  • The change is part of the updated RCS standard
  • Texts sent from iOS to Android can’t yet be edited, though

Sending text messages between an iPhone and an Android device has long been a pretty poor experience, with features like typing indicators and read receipts missing for years. That’s shifted in recent years thanks to the use of Rich Communication Services (RCS), and it’s bringing another benefit to your cross-platform chats.

In this case, that’s the ability to edit texts sent from an Android phone to an iPhone (via Android Authority). This feature appears to be rolling out gradually to Android users, so it’s not available to everyone just yet. But if it’s working for you, all you’ve got to do is long press on a sent message, then tap the pencil icon, make your adjustments and save your message.

Unfortunately, this doesn’t work the other way around – that is, texts sent from an iPhone to an Android device cannot be edited. Presumably, Apple will need to update its Messages app to add support for this functionality.

You’ve been able to edit texts sent between iPhones for years, and messages going from one Android device to another have been editable when using RCS for about twelve months. But although editable messages are now part of RCS, companies like Apple and Google need to support the feature – which is why it’s not available in iOS right now.

Slowly adding support

(Image credit: Shutterstock / Tada Images )

Apple has been reluctant to support RCS for a long time, partly because it previously offered much weaker encryption than Apple’s iMessage platform, which is end-to-end encrypted. However, the change that introduced editable texts to RCS has now also brought forth end-to-end encryption, which might help to smooth things over with Apple.

The rollout of editable messages also hasn’t been entirely pain-free. While edited messages appear as normal on Android (with a small “Edited” timestamp underneath them), they behave differently in iOS. There, iPhone users see a second message preceded by an asterisk, doubling up the number of texts on their screen.

Both Apple and Google gave their support to cross-platform RCS messages earlier this year, so we’re hoping that these bugs and oddities will be ironed out in due course. For now, though, the situation when texting across phone platforms has been improved, even if only in one small way.

You might also like
Shadow Labyrinth will run at 4K 60fps on Nintendo Switch 2 thanks to a free upgrade - Wednesday, July 2, 2025 - 06:21
  • There will be a free Nintendo Switch 2 upgrade for Shadow Labyrinth
  • The game will run at 4K 60fps on the Nintendo Switch 2
  • It's available to pre-order now

Upcoming strange Pac-Man game Shadow Labyrinth will run at 4K 60 frames per second (fps) on Nintendo Switch 2 in docked mode thanks to a free Nintendo Switch 2 Edition Upgrade Pack.

This was revealed as part of the most recent trailer for the game, which gave us a decent look at the Nintendo Switch 2 version in action. It also presented some side-by-side footage showing the Nintendo Switch version too, which seems to be running at a noticeably lower frame rate and resolution.

Both the Nintendo Switch and Nintendo Switch 2 versions of the game are up for pre-order via the eShop, where they both cost $29.99 / £24.99. The Nintendo Switch 2 Edition Upgrade Pack is also available to pre-order and is completely free.

Shadow Labyrinth was first revealed at The Game Awards 2024, with a subsequent appearance in the Nintendo Switch 2 Direct. A darker take on Pac-Man, the game is a 2D metroidvania adventure in which the protagonist Swordsman No. 8 explores a sinister maze accompanied by the familiar yellow Puck.

It features plenty of combat and traversal, but also a few elements directly inspired by the classic arcade Pac-Man gameplay. It's set to launch on July 18 this year and is coming to PC, PlayStation 5, Xbox Series X and Series S in addition to Nintendo Switch and Nintendo Switch 2.

You might also like...
Dying Light: The Beast won't have branching narrative choices, but the developer says it will pave the way for the series' future - Wednesday, July 2, 2025 - 06:24
  • Techland has discussed how the narrative is shaping up in Dying Light: The Beast
  • The developer is doing away with branching choices
  • This is in an effort to create a starting point for the series' future

Developer Techland will be stepping away from player-driven narrative choices for the upcoming Dying Light: The Beast. But it seems like there's going to be a very good reason for that, at least in relation to the game's returning protagonist - Kyle Crane.

In an interview with GamesRadar, Dying Light franchise director Tymon Smektała explained: "We wanted this to be a canon entry into the series. We're looking back at what happened to Kyle Crane in the first game, and we want to tell the next chapter of the story."

"One thing that Dying Light: The Beast does is hint at the future of the series," he adds. "We really wanted to make sure that at the end of the game, Kyle Crane is where we want him to be, so that's why we decided to back down from the narrative choices of Dying Light 2."

Furthermore, it's likely that Techland is looking to shape the future of the Dying Light franchise with what happens at the conclusion of The Beast.

While he didn't drop any juicy story hints, Smektała told TechRadar Gaming: "We definitely have, I would say, some Marvel [style] post-credit scenes that hint at some things that are going to happen in the future."

Smektała also provided further context on the decision to move away from branching narrative choices, adding: "If we would have given the players agency in terms of how they want to shape the story, then it will be harder for us to have Kyle where we want him to be at the end of the game.

"So this is a very canonical Kyle story that answers everything that happens to him before and after the events of Dying Light."

You might also like...

Pages