Toggle light / dark theme

Encryption: A Key Guardian of Our Digital Future

By Chuck Brooks and Bill Bowers.


Every time you send a text, pay for groceries with your phone, or use your health site, you are relying on encryption. It’s an invisible shield that protects your data from prying eyes. Encryption is more than just a technological protection; it is the basis for digital trust.

Encryption is more than just safeguarding data; it is also about protecting people. It helps ensure privacy by protecting persons from spying and exploitation. And it is widely adopted to help ensure digital transaction security. For National Security it serves to protect key infrastructure and government communications. And it has a human rights function by providing citizens with peace of mind by ensuring the safety of their personal information. In places where surveillance is widespread, encryption can even defend free expression and opposition. It is a human right in this digital age.

In my book Inside Cyber: How AI, 5G, IoT, and Quantum Computing Will Transform Privacy and Security, I referred to encryption as the “linchpin of privacy and commerce in a connected society.” Without it, the digital economy would crumble under the strain of criminality, fraud, and spying.

Google Confirms CVE-2026–21385 in Qualcomm Android Component Exploited

There are currently no details on how the vulnerability is being exploited in the wild. However, Google acknowledged in its monthly Android security bulletin that “there are indications that CVE-2026–21385 may be under limited, targeted exploitation.”

Google’s March 2026 update contains patches for a total of 129 vulnerabilities, including a critical flaw in the System component (CVE-2026–0006) that could lead to remote code execution without requiring any additional privileges or user interaction. In contrast, Google addressed one Android vulnerability in January 2026 and none last month.

Also patched by Google are multiple critical-rated bugs: a privilege escalation bug in Framework (CVE-2026–0047), a denial-of-service (DoS) in System (CVE-2025–48631), and seven privilege escalation flaws in Kernel components (CVE-2024–43859, CVE-2026–0037, CVE-2026–0038, CVE-2026–0027, CVE-2026–0028, CVE-2026–0030, and CVE-2026–0031).

REPLACED BY AI! | Seedance 2 + Kling 3.0 Short Film

The increasing use of Artificial Intelligence (AI) in the workplace is leading to job displacement and raising concerns among employees about the security of their positions ## Key Insights.

Career Obsolescence Through AI

🔄 AI engineer David becomes obsolete after 7 years and 1,000 lines of code building the AI division, receiving a “sweet pink slip” as the CEO eliminates his role and takes his company car while AI assumes control of the entire division.

Existential Work Motivation.

💭 David questions whether his 7-year dedication was driven by glory, stock options, passion, art, or simply maintaining purpose (“beating heart”), confronting the irony of being replaced by the AI system he built.

Corporate Restructuring Mechanics.

Association of Systemic Inflammatory Markers With Cerebral Small Vessel Disease ProgressionA Community-Based Prospective Study

This study investigated the associations between neutrophil-to-lymphocyte ratio, monocyte-to-lymphocyte ratio, and systemic immune-inflammation index with progression of CSVD.


This website uses a security service to protect against malicious bots. This page is displayed while the website verifies you are not a bot.

Microsoft testing Windows 11 batch file security improvements

Microsoft is rolling out new Windows 11 Insider Preview builds that improve security and performance during batch file or CMD script execution.

As Microsoft explained today, IT administrators can now enable a more secure processing mode that prevents batch files from being modified while they run by adding the LockBatchFilesInUse registry value under HKEY_LOCAL_MACHINE\Software\Microsoft\Command Processor.

Policy authors can also enable this mode using the LockBatchFilesWhenInUse application manifest control.

NIK-driven IL-23 production by myeloid cells is a key factor in the development of autoimmune inflammation

Nishada Ramphal, Ari Waisman et al. (Johannes Gutenberg-Universität Mainz) reveal that NIK drives neuroantigen-specific T cell priming by regulating antigen presentation and IL-23 production, identifying NIK as a key orchestrator of myeloid-driven CNS autoimmunity.

Neuroinflammation.


This website uses a security service to protect against malicious bots. This page is displayed while the website verifies you are not a bot.

AI Is The 21st Century Force Multiplier

Ease see my latest Forbes article and have a great weekend! Chuck Brooks by Chuck Brooks.

#artificialIntelligence #ai #future #tech Forbes


AI is redefining power, productivity, security, and sovereignty. Dual-use, convergent, and autonomous AI is the 21st-century force multiplier. Not only is technology advancing, but civilization is about to change.

The 1956 Dartmouth Conference invented the term “artificial intelligence.” Alan Turing and other pioneers shaped the conceptualization of AI. The first systems used symbolic logic and determinism. Certain expert systems excelled but struggled in dynamic, uncertain environments. Fragility, computational capacity, and data accessibility caused “AI winters.”

UAT-10027 Targets U.S. Education and Healthcare with Dohdoor Backdoor

A previously undocumented threat activity cluster has been attributed to an ongoing malicious campaign targeting education and healthcare sectors in the U.S. since at least December 2025.

The campaign is being tracked by Cisco Talos under the moniker UAT-10027. The end goal of the attacks is to deliver a never-before-seen backdoor codenamed Dohdoor.

“Dohdoor utilizes the DNS-over-HTTPS (DoH) technique for command-and-control (C2) communications and has the ability to download and execute other payload binaries reflectively,” security researchers Alex Karkins and Chetan Raghuprasad said in a technical report shared with The Hacker News.

/* */