
Mels Dees
Timeline


Phishing campaign bypasses security corrupt Word documents
A new phishing attack abuses Microsoft Word's recovery option by sending corrupt Word documents as e-mail att...

Musk again challenges OpenAI profitability
Technology entrepreneur Elon Musk filed a petition in federal court to prevent OpenAI from fully transforming...

Advisory body considers vulnerable marine cables
The International Telecommunication Union (ITU) and the International Cable Protection Committee (ICPC) are i...

Chinese companies poach ASML staff with high salary
One of the challenges for Chinese companies in developing chip production machines is the shortage of experie...

“Cancel Oracle’s trademark for JavaScript”
Deno, a company offering a JavaScript runtime, filed a petition with the U.S. Patent and Trademark Office (US...

Google introduces its own version of Slack’s Huddles
Google Chat is launching a new feature for instant voice meetings. The company seems inspired by Slack's Hudd...

Spotify is restricting developers’ API access
Spotify is no longer allowing developers who build external apps using the platform's Web API access to vario...

Data breach at Cloudflare after failed software update
Cloudflare admits that a faulty software update corrupted its logging-as-a-service service, resulting in the ...

AWS introduces updates to Amazon Cognito
New features have been added to Amazon Web Services' (AWS) identity and access management platform to help de...