Category: Latest News

  • WhatsApp’s New In-App Message Translation

    WhatsApp’s New In-App Message Translation

    WhatsApp Now Translates Messages Natively

    WhatsApp has launched a message translation feature for both iOS and Android. Now when you receive a message in a language different from your preferred one you can simply long-press the message and tap Translate.

    The translation works in one-to-one chats groups and channel updates. On Android there’s also an automatic translation option for entire chat threads. Once enabled all future incoming messages in that thread are translated by default.

    Language Support & Platform Differences

    For Android users the feature initially supports six languages English Spanish Hindi Portuguese Russian and Arabic.
    Meanwhile for iPhone iOS users the rollout is broader with support for more than 19 languages at launch.
    Notably WhatsApp has confirmed that additional languages will be added over time expanding accessibility worldwide.

    Privacy & On-Device Processing

    • Importantly translations are processed directly on the user’s device. This means WhatsApp does not see the content of messages during translation your chats remain end-to-end encrypted and private.. About Facebook
    • There’s also mention of downloading language packs so that future translations are faster and usable even without strong connectivity.

    How the New Translation Feature Works

    Meta has introduced a native translation feature on WhatsApp allowing users to convert messages into their preferred default language. The tool works across personal chats group conversations and channel updates.

    On Android the feature currently supports six languages English Spanish Hindi Portuguese Russian and Arabic. iPhone users however get a broader rollout with support for more than 19 languages at launch. Meta has confirmed that more languages will be added in upcoming updates.

    How It Works Key Features

    To translate a message simply long-press the text and tap Translate.

    For Android users there’s an additional option you can enable automatic translation for entire chat threads. Once activated every future message in that thread will be translated by default.

    Importantly all translations are processed directly on the user’s device. This ensures that WhatsApp and Meta cannot see the content of your messages preserving end-to-end encryption and privacy.

    What to Be Aware Of Limitations

    Currently only certain languages are supported at launch. If your preferred language isn’t available yet you’ll need to wait for future updates.
    Moreover the feature is rolling out gradually. This means it may not appear on all devices right away but broader availability is expected soon..

    Key Features:

    • Key Features of WhatsApp’s New Translation Tool
    • In-App Translation: Users can now translate messages directly within WhatsApp without relying on third-party apps.
    • Automatic Language Detection: The app intelligently identifies the language of each incoming message.
    • User-Friendly Interface: A subtle Translate button appears only when needed keeping the chat experience simple.
    • Broad Language Support: WhatsApp currently supports a wide range of languages with more to be added over time.

    Benefits of Native Translation

    Integrating translation directly into WhatsApp provides several advantages:

    • Convenience: No more copying and pasting into external apps everything happens inside WhatsApp.
    • Speed: Messages translate instantly making conversations more efficient.
    • Accessibility: Breaking down language barriers this feature helps users connect easily with people worldwide.

  • Airport Disruptions Continue After Cyberattack

    Airport Disruptions Continue After Cyberattack

    European Airports Still Grappling with Aftermath of Cyberattack

    Several European airports are still experiencing disruptions following a recent ransomware attack. The incident which occurred several days ago continues to impact flight schedules and airport operations causing headaches for travelers.

    Impact on Airport Operations

    The ransomware attack has affected key systems leading to:

    • Flight delays and cancellations
    • Disruptions in baggage handling
    • Check-in process slowdowns

    Airlines and airport authorities are working to restore systems and minimize further disruptions. Passengers are advised to check their flight status and arrive at the airport well in advance.

    Cybersecurity Measures

    This recent airport cyberattack underscores exactly how fragile critical infrastructure can be and reinforces the need for proactive multilayered defenses. Below is more information on the incident the risks it highlights and best practices for strengthening cybersecurity in such contexts.

    Recent Incident European Airport Disruption

    In September 2025 major European airports Heathrow Berlin Brussels among others experienced disruptions to check-in boarding and baggage systems. The issue was traced to a cyberattack on Collins Aerospace’s MUSE vMUSE system which many carriers use for shared check-in boarding infrastructure.

    The EU cybersecurity agency ENISA confirmed the attack was a ransomware incident.
    Because many airports use the same vendor system attacking a central provider allowed wide downstream impact i.e. a supply chain attack.

    Some airports reverted to manual operations as a fallback but service quality and throughput were heavily degraded.
    Experts note that reactive defenses are no longer sufficient. Systems must be resilient continuously monitored and designed with failure modes in mind.

    Why Airports Are Attractive Targets

    • High impact & visibility: Disrupting airport systems causes enormous operational chaos financial losses and media attention.
    • Tightly integrated systems: Airports have many connected systems check-in baggage flight ops radar passenger services. A breach in one can cascade.
    • Legacy aging infrastructure: Many systems weren’t built with modern cybersecurity threats in mind they might rely on outdated protocols or weak segmentation.
    • Vendor supply chain exposure: As seen in this case a compromise at a third-party vendor can cascade to multiple airports.
    • Regulatory & legal consequences: When critical services are impacted regulatory bodies may impose fines oversight, or mandate cybersecurity standards.

    Ransomware Attacks on the Rise

    • In 2025 nearly 63% of businesses worldwide reported being affected by ransomware. Statista
    • Government entities have seen a 65% increase in ransomware attacks in the first half of 2025 compared to the same period in 2024.
    • Total logged ransomware attacks in H1 2025 were 3,627 globally up about 47% over H1 2024.

    Key Impacts & Costs

    • Ransom demands: For government agencies in H1 2025 the average ransom requested was about US$1.65 million across both confirmed and unconfirmed attacks. In confirmed attacks average demands rose to nearly US$2.44 million.
    • Downtime: Manufacturing firms are reporting average downtime of 11.6 days per ransomware incident with losses of ~US$1.9 million per day from downtime in some cases.
    • Total economic impact:
      • In Germany cyber-attacks ransomware being the most damaging cost the economy about €300 billion ~US$355 billion) over a recent period.
      • In one case Jaguar Land Rover expects losses of £3.5 billion revenue and £1.3 billion gross profits if its disrupted operations don’t resume quickly after its cyberattack.

    Other Costs Beyond the Ransom

    • Recovery costs: Hiring cybersecurity experts forensic investigations restoring systems and data from backups.
    • Operational disruption: Lost productivity halting or slowing of services possibly shutting down entire facilities or supply chains.
    • Reputational damage: Loss of customer trust customer compensation regulatory scrutiny.
    • Regulatory fines & legal exposure: If data breaches occur or privacy laws are violated.

    Recent High-Profile Examples

    Jaguar Land Rover: A cyberattack has led to a factory shutdown major supply chain disruption with enormous cost implications.
    Collins Aerospace RTX: Ransomware attack disrupted airport check-in and baggage drop systems across Europe.

  • Jeep Gladiator Electric Plans Canceled by Stellantis

    Jeep Gladiator Electric Plans Canceled by Stellantis

    Stellantis Shelves Electrified Jeep Gladiator Plans

    Stellantis has decided to halt its plans to produce an electrified version of the Jeep Gladiator. This decision marks a shift in the company’s strategy for its Jeep lineup. The automotive industry is constantly evolving, and manufacturers like Stellantis are adapting to changing market demands and technological advancements. Keep reading to explore more on the implications of this change.

    Reasons Behind the Cancellation

    While Stellantis has not released an official statement detailing the exact reasons for this decision, several factors could have contributed. These might include:

    • Market Analysis: Perhaps the projected demand for an electrified Jeep Gladiator did not meet Stellantis’ expectations. Automakers constantly analyze market trends to ensure that their investments align with consumer preferences.
    • Technological Challenges: Developing a robust and efficient electric powertrain for a vehicle as rugged as the Gladiator presents significant engineering challenges. Stellantis may have encountered hurdles in meeting its performance and range targets.
    • Cost Considerations: The cost of developing and manufacturing an electric vehicle (EV), particularly one designed for off-road use, can be substantial. Stellantis might have determined that the return on investment was not sufficient.
    • Strategic Priorities: Stellantis may be prioritizing other electric vehicle projects within its broader portfolio. Resource allocation is a critical aspect of corporate strategy, and the company may be focusing its efforts on more promising EV ventures.

    Impact on Jeep’s Electrification Strategy

    This cancellation doesn’t necessarily signal a complete abandonment of Jeep’s electrification plans. Stellantis has already committed to introducing electric versions of other Jeep models, such as the Jeep Wrangler 4xe and the Jeep Recon. The company’s overall strategy likely involves a phased approach, focusing on models where electrification is deemed more viable and appealing to consumers. For example, you can read about Jeep’s electrification plans on Motor Authority. Also, Electrek discusses Jeep’s EV Strategy here.

    Potential Future Developments

    While the electrified Gladiator is off the table for now, the possibility remains that Stellantis could revisit the idea in the future. Advancements in battery technology, coupled with evolving consumer preferences, could make an electric Jeep Gladiator more feasible and attractive in the years to come. The Stellantis official website provides ongoing updates on their future plans.

  • TikTok US Deal What’s Happening Now?

    TikTok US Deal What’s Happening Now?

    TikTok US Deal What’s Happening Now?

    The situation surrounding TikTok in the US remains dynamic. Several factors contribute to the ongoing uncertainty making it difficult to pinpoint the exact status of any potential deal. This article aims to provide an overview of the recent developments and what they signify for the popular video-sharing app.

    Key Players and Their Roles

    Several entities are central to understanding the TikTok US deal saga:

    • ByteDance: The Chinese parent company of TikTok. They face pressure to address US security concerns.
    • The US Government: Governmental bodies express national security concerns regarding data privacy and potential censorship.

    Background & Legal Framework

    CFIUS has previously reviewed ByteDance’s acquisition of Musical.ly and other transactions involving ByteDance.

    Under the law CFIUS can require divestitures or mitigation if it finds national security risks in foreign control of U.S. operations. For TikTok any deal must address those concerns.

    PAFACA The Sale-or-Ban Law

    In April 2024 the U.S. Congress passed the Protecting Americans from Foreign Adversary Controlled Applications Act PAFACA. Under this law apps controlled by a foreign adversary explicitly ByteDance and TikTok must divest or else be banned.

    The law set a deadline initially January 19, 2025 for compliance which would involve ByteDance divesting or losing control over U.S. operations.

    Supreme Court TikTok v. Garland Decision

    TikTok and ByteDance challenged PAFACA arguing among other things that it violated First Amendment rights due process etc. The Supreme Court unanimously upheld the law in early 2025.

    However the law’s enforcement has been delayed several times via executive orders while a deal is negotiated.

    Recent Negotiations & Key Issues

    Framework Deal

    As of mid-September 2025 the U.S. and China reportedly reached a framework agreement for TikTok to restructure its U.S. operations. Under this deal ByteDance would retain less than 20% ownership with the rest held by U.S. or American-led investors. Oracle Silver Lake and others are named. Oracle would also manage data security and could be involved in licensing oversight of the recommendation algorithm. Financial Times

    Algorithm Licensing Control Disputes

    A major sticking point in negotiations is whether ByteDance will give up control of the content recommendation algorithm completely or only license it. U.S. lawmakers want operational control for security reasons while ByteDance seems to favor licensing to retain some degree of influence.

    Deadlines & Extensions

    The January 2025 deadline under PAFACA was not met. The U.S. has repeatedly delayed enforcement via executive orders to allow negotiations to proceed. The latest extension pushes enforcement to December 16, 2025.

    Data Security & U.S. Oversight

    The proposed deal would require all U.S. user data to be stored in U.S. infrastructure managed by a U.S. based entity. Oracle is expected to play a central role in security management.

    The recommendation algorithm must be overseen retrained or rebuilt in a way that prevents Chinese government or ByteDance control over U.S. user recommendations.

    Challenges & Uncertainties

    Will the deal fully satisfy the legal requirements in PAFACA? Some lawmakers argue that licensing of the algorithm may still leave too much ByteDance influence.

    China’s acceptance the Chinese government has reportedly agreed to license the algorithm and allow divestment under these terms, but details are still being finalized.

    Oversight & enforcement Even if a deal is signed ensuring that the new entity abides by rules data separation algorithm transparency board structure etc. will be complex and likely contentious.

    Challenges and Roadblocks

    Several obstacles have hindered a swift resolution:

    • Data Security Concerns: Ensuring US user data remains secure and protected from potential access by the Chinese government is paramount.
    • Technological Complexity: Structuring a deal that satisfies both US regulatory requirements and ByteDance’s business interests involves intricate technological and legal considerations.
    • Geopolitical Tensions: Broader US-China relations add another layer of complexity influencing the negotiations and potential outcomes.

    Potential Outcomes and Future Scenarios

    The future of TikTok in the US remains uncertain with several possible scenarios:

    • Continued Operation with Oversight: TikTok could continue operating under strict monitoring and compliance requirements.
    • Divestiture: ByteDance could be compelled to sell TikTok’s US operations to an American company.

  • Stellantis Data Breach: Customer Info Compromised

    Stellantis Data Breach: Customer Info Compromised

    Stellantis Confirms Customer Data Stolen in Breach

    Automaker giant Stellantis recently announced a data breach impacting some of its customers. The company is currently investigating the extent of the breach and notifying affected individuals.

    What Happened?

    Stellantis is working to determine precisely what information the hackers accessed. The company assures that they are taking steps to secure their systems and prevent future incidents.

    Who Was Affected?

    While the specific number of affected customers remains unclear, Stellantis is actively contacting those whose personal data may have been compromised. Customers who have accounts or have interacted with Stellantis services should monitor their accounts for suspicious activity.

    What Information Was Stolen?

    The investigation is ongoing to pinpoint the specific types of data that were stolen. Potentially compromised data may include:

    • Names
    • Addresses
    • Contact Information
    • Vehicle Information

    Stellantis’ Response

    Stellantis stated that they have implemented security measures and are cooperating with law enforcement to address the data breach. The company also encourages affected customers to take precautions, such as monitoring credit reports and being vigilant against phishing attempts.

  • Oracle Appoints Co-CEOs: Leadership Changes

    Oracle Appoints Co-CEOs: Leadership Changes

    Oracle’s New Leadership: Two Presidents Share CEO Role

    Oracle Corporation recently announced a significant shift in its leadership structure. The company promoted two presidents to the co-CEO role. This move signals a new chapter for the tech giant as it navigates an evolving market landscape.

    Details of the Co-CEO Appointment

    The decision to appoint two individuals to the CEO position reflects Oracle’s strategy to leverage diverse expertise. By sharing leadership responsibilities, the company aims to enhance its agility and innovation capabilities.

    Implications for Oracle’s Strategy

    This leadership change could influence Oracle’s strategic direction. Observers anticipate potential shifts in focus areas, such as cloud computing, database management, and enterprise software solutions.

    Reactions from the Tech Industry

    The tech industry is closely watching how this co-CEO structure will impact Oracle’s performance and competitive positioning. Some analysts view this as a bold move, while others express caution about potential challenges in shared leadership.

  • eBay Expands into Social Market with Tise Acquisition

    eBay Expands into Social Market with Tise Acquisition

    eBay to Acquire Social Marketplace Platform Tise

    eBay is set to broaden its reach in the social commerce arena by acquiring Tise, a popular social marketplace platform. This strategic move allows eBay to tap into Tise’s unique approach to buying and selling, particularly among younger generations. This acquisition signifies eBay’s commitment to staying relevant and competitive in the evolving e-commerce landscape.

    What Tise Brings to eBay

    Tise has carved out a niche for itself as a platform that combines social networking elements with a marketplace experience. Users can discover, buy, and sell items through personalized feeds and engage with each other. This social aspect fosters a sense of community and trust, which attracts a different demographic than traditional e-commerce platforms.

    • Tise emphasizes sustainable shopping, which aligns with the growing consumer demand for eco-friendly options.
    • It provides a mobile-first experience, catering to the preferences of younger users who primarily use smartphones for online activities.

    eBay’s Strategy and Market Expansion

    The acquisition of Tise enables eBay to expand its market presence and attract new customer segments. By integrating Tise’s social commerce features, eBay enhances its platform and appeals to a wider audience. The move reflects eBay’s ongoing efforts to innovate and adapt to changing consumer behaviors.

    The Future of Social Commerce

    Social commerce is transforming the way people shop online. Platforms like Tise demonstrate the power of combining social interaction with e-commerce. As consumers increasingly seek personalized and community-driven shopping experiences, expect more companies to integrate social features into their platforms.

  • Ransomware Hits Airport Systems: EU Agency Confirms

    Ransomware Hits Airport Systems: EU Agency Confirms

    EU Cyber Agency Confirms Ransomware Attack Causing Airport Disruptions

    The European Union Agency for Cybersecurity (ENISA) has confirmed that a recent ransomware attack caused significant disruptions to airport systems. This incident highlights the increasing threat ransomware poses to critical infrastructure worldwide. Understanding the scope and impact of such attacks is crucial for enhancing cybersecurity measures.

    Details of the Attack

    While specific details about the affected airports remain confidential, ENISA’s confirmation underscores the severity of the situation. Ransomware attacks typically involve malicious actors encrypting data and demanding a ransom for its release. These attacks often exploit vulnerabilities in systems and human error.

    Airport disruptions can range from flight delays and cancellations to compromised passenger data. The financial and reputational damage can be substantial.

    Impact on Airport Operations

    • Flight Delays and Cancellations: The most immediate impact often involves disruptions to flight schedules.
    • Data Breaches: Sensitive passenger and operational data may be compromised.
    • Operational Disruptions: Essential airport systems, such as baggage handling and security, can be affected.

    Ransomware Trends and Mitigation

    Ransomware attacks are becoming increasingly sophisticated and targeted. Organizations need to adopt a multi-layered approach to cybersecurity. You can learn more about the ransomware landscape and strategies for prevention through resources like CISA’s ransomware guide.

    Best practices for mitigating ransomware attacks:

    • Regularly back up critical data and store it offline.
    • Implement robust network segmentation to contain potential breaches.
    • Conduct regular security audits and vulnerability assessments.
    • Train employees to recognize and avoid phishing attempts.
    • Keep software and systems up-to-date with the latest security patches.
  • Fusion Reactor: Commonwealth’s Billion-Dollar Power Deal

    Fusion Reactor: Commonwealth’s Billion-Dollar Power Deal

    Commonwealth Fusion Systems Secures $1B+ Power Agreement

    Commonwealth Fusion Systems (CFS) has secured a significant power deal, exceeding $1 billion, for its upcoming fusion reactor. This agreement marks a crucial step towards realizing practical and commercially viable fusion energy. This deal ensures the availability of substantial power resources necessary for operating and testing their innovative fusion technology.

    Powering the Future: The Significance of the Deal

    This power agreement is a testament to the growing confidence in fusion energy. Securing such a large-scale deal demonstrates the potential of CFS’s approach to fusion and the increasing interest from energy providers. By locking in this power supply, CFS mitigates potential risks associated with energy availability as they move closer to launching their fusion reactor.

    Advancing Fusion Technology

    CFS continues to push the boundaries of fusion technology. Their approach focuses on using high-temperature superconducting magnets. This will allow the creation of smaller and more cost-effective fusion reactors. Their partnership with MIT’s Plasma Science and Fusion Center further accelerates their research and development efforts. Learn more about their innovative approach on the MIT News website.

    The Promise of Fusion Energy

    Fusion energy holds immense promise as a clean, safe, and virtually limitless energy source. Unlike fossil fuels, fusion produces no greenhouse gasses and minimal radioactive waste. This power agreement represents a major step towards harnessing fusion’s vast potential to meet the world’s growing energy needs while addressing climate change concerns. For more insight into the global effort towards fusion energy, visit the IAEA’s Fusion Energy page.

  • Cyberattack Causes Flight Delays at Major Airports

    Cyberattack Causes Flight Delays at Major Airports

    Cyberattack Disrupts Flights at Heathrow and Other Airports

    A recent cyberattack caused significant disruptions and delays at Heathrow Airport and several other airports. Hundreds of flights experienced delays, leaving passengers stranded and frustrated. The nature and source of the cyberattack are currently under investigation.

    Impact on Air Travel

    The cyberattack affected critical systems which airlines and airports depend on, leading to widespread delays. Passengers reported long queues, missed connections, and overall travel chaos. The disruption highlights the vulnerability of air travel infrastructure to cyber threats.

    • Hundreds of flights delayed.
    • Significant disruption at Heathrow and other airports.
    • Passengers faced long queues and missed connections.

    Cybersecurity Concerns

    This incident has raised serious concerns about cybersecurity within the aviation industry. Airports and airlines need to prioritize cybersecurity measures to protect their systems and data from potential attacks. Investment in robust security protocols and employee training is essential to prevent future disruptions.

    Investigation Underway

    Authorities are actively investigating the cyberattack to identify the perpetrators and determine the extent of the damage. The investigation aims to understand the methods used in the attack and implement measures to prevent similar incidents from occurring in the future. Cybersecurity experts are working to reinforce the defenses of critical infrastructure against potential threats. The incident emphasizes the need for continuous vigilance and proactive security measures in the face of evolving cyber threats.