433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | info@poseidon-us.com | Office: (813) 563-2652

What if AI becomes conscious and we never know

A philosopher at the University of Cambridge says there’s no reliable way to know whether AI is conscious—and that may remain true for the foreseeable future. According to Dr. Tom McClelland, consciousness alone isn’t the ethical tipping point anyway; sentience, the capacity to feel good or bad, is what truly matters. He argues that claims of conscious AI are often more marketing than science, and that believing in machine minds too easily could cause real harm. The safest stance for now, he says, is honest uncertainty.
http://news.poseidon-us.com/TQ5cbl

Duplicati: Free, open-source backup client

Duplicati is an open source backup client that creates encrypted, incremental, compressed backup sets and sends them to cloud storage services or remote file servers. What the project is and where it runs Duplicati operates as a client side application designed to back up files and folders from endpoints and servers. It runs locally, collects selected data, packages it into backup volumes, and transfers those volumes to a configured destination. Restore operations support individual files, … More → The post Duplicati: Free, open-source backup client appeared first on Help Net Security.
http://news.poseidon-us.com/TQ4xDB

What consumers expect from data security

Security teams spend years building controls around data protection, then a survey asks consumers a simple question about responsibility and the answer lands close to home. Most people believe they are in charge of their own data privacy, and they want systems that support that belief, according to the 2025 Data Privacy Research from the Software & Information Industry Association. The study examines how people view responsibility, cost, and acceptable data use. Personal agency shapes … More → The post What consumers expect from data security appeared first on Help Net Security.
http://news.poseidon-us.com/TQ4xD3

Illegal streaming grew into an organized, profitable, and dangerous industry

Rising streaming prices are pushing more viewers toward illegal options. Movies, TV shows, and live sports are now spread across multiple platforms, and keeping up with all of them is expensive. When something is easy to access, works smoothly, and feels low risk, people adopt it. Over time, it stops feeling like an exception and starts feeling normal. Understanding the risks Research shows that one in ten people believe there is no risk in using … More → The post Illegal streaming grew into an organized, profitable, and dangerous industry appeared first on Help Net Security.
http://news.poseidon-us.com/TQ4xC6

Security coverage is falling behind the way attackers behave

Cybercriminals keep tweaking their procedures, trying out new techniques, and shifting tactics across campaigns. Coverage that worked yesterday may miss how those behaviors appear today. The 2025 Threat-Led Defense Report from Tidal Cyber draws on tens of thousands of observed techniques and procedures collected through its threat intelligence platform. The study tracks adversary activity across campaigns, sectors, and regions, then maps that activity to MITRE ATT&CK behaviors. TTP evolution shows groups adapting in place Attacker … More → The post Security coverage is falling behind the way attackers behave appeared first on Help Net Security.
http://news.poseidon-us.com/TQ4tWx

Ransomware’s new playbook is chaos

Ransomware threats are accelerating in scale, sophistication, and impact. Data reveals how evolving techniques, shifting payment trends, and AI-driven capabilities are reshaping the threat landscape, and raising the stakes for every organization. The weekend is prime time for ransomware Over half of organizations that experienced a ransomware event in the past year were hit during a weekend or holiday, according to a Semperis reportion, and fewer eyes on identity systems. Intruders know that reduced attention … More → The post Ransomware’s new playbook is chaos appeared first on Help Net Security.
http://news.poseidon-us.com/TQ4tW0

Radio signals could give attackers a foothold inside air-gapped devices

Air-gapped systems are meant to stay quiet. Remove network ports, lock down inputs, and the device should have nothing to hear. A new study shows that this breaks down when software control is lost. Embedded devices with no radios and no sensors can still receive wireless commands through the air. Starting from a familiar threat model Security teams will find the setup familiar. An attacker first gains code execution on an embedded device through means … More → The post Radio signals could give attackers a foothold inside air-gapped devices appeared first on Help Net Security.
http://news.poseidon-us.com/TQ46Cj