facebookcollapse
searchengine
robotics
virtualreality
computing
cyberwar
glitch
News & Articles By Kevin Hughes
03/27/2026
/
By Kevin Hughes
TRUMP AMERICA AI Act proposes sweeping changes to AI liability, Section 230 repeal, and federal oversight
The TRUMP AMERICA AI Act seeks to fully repeal Section 230, eliminating legal protections for online platforms regarding user-generated content. This would force platforms into aggressive censorship to avoid lawsuits over controversial posts, chilling free speech and investigative journalism. The bill introduces retroactive liability for AI developers, exposing them to lawsuits for “defective design,” “unreasonably […]
03/15/2026
/
By Kevin Hughes
BrightLearn.AI: Revolutionizing self-publishing with AI-generated books
BrightLearn.AI is a revolutionary, free AI platform developed by Natural News founder Mike Adams that enables users to generate fully formatted books—including citations, cover art and PDFs—in minutes. It focuses on decentralized knowledge, bypassing Big Tech censorship and supporting independent authors. Unlike mainstream AI tools (e.g., ChatGPT), BrightLearn.AI explores taboo topics like natural medicine, suppressed history and […]
03/12/2026
/
By Kevin Hughes
Iran’s drone strikes on Amazon data centers signal new era of cyber-physical warfare
Iranian drone strikes targeted Amazon Web Services (AWS) data centers in the UAE and Bahrain, marking the first deliberate military attack on commercial cloud infrastructure, disrupting banking, food delivery and enterprise services. Iran’s Islamic Revolutionary Guard Corps (IRGC) justified the strikes by claiming AWS facilities support enemy military and intelligence operations, highlighting the growing convergence […]
03/05/2026
/
By Kevin Hughes
Digital Detonation: A wake-up call for the digital age
The book “Digital Detonation: The Hidden War on Your Devices” reveals how devices like smartphones, pagers and laptops can be remotely detonated or hacked, citing real-world examples like the 2024 Lebanon pager bombings. Lithium-ion batteries are vulnerable to firmware tampering and directed energy attacks, making them potential explosives. Supply chain compromises (especially from China) allow […]
03/03/2026
/
By Kevin Hughes
Israel used hacked traffic cameras and AI to assassinate Iran’s Supreme Leader, report reveals
Israeli intelligence (Mossad and Unit 8200) spent years hacking Tehran’s traffic cameras and mobile networks, gathering detailed data on Supreme Leader Ali Khamenei’s routines, security protocols and inner circle. AI analyzed billions of data points to map his “patterns of life.” Israel executed Operation Roaring Lion with 30 precision-guided missiles, targeting Khamenei’s compound during a […]
03/03/2026
/
By Kevin Hughes
Trump BLACKLISTS Anthropic after AI firm defies Pentagon demands
President Donald Trump directed U.S. agencies to cease using Anthropic’s AI systems, accusing the company of undermining national security by refusing Department of War demands to remove ethical restrictions on mass surveillance and autonomous weapons. The Pentagon classified Anthropic as a national security threat, effectively barring military contractors from working with the company, while Anthropic vowed legal […]
03/03/2026
/
By Kevin Hughes
SHORTAGE of gas turbines sparks energy crisis, threatening AI tech boom
AI-driven data centers could require 300 GW by 2030 (up from 60 GW today), with McKinsey predicting a 20% annual increase in electricity consumption—unseen since the Industrial Revolution. Uncertain projections (Schneider Electric estimates range from 16.5 GW to 65.3 GW) reveal speculative hype, yet utilities use inflated numbers to justify rate hikes and infrastructure expansions. […]
03/01/2026
/
By Kevin Hughes
Software engineer accidentally gains control of 7,000 robot vacuums, exposing serious security flaw
A software engineer accidentally accessed 7,000+ robot vacuums across 24 countries due to a security flaw, allowing unauthorized access to live camera feeds, microphones, floor plans and device tracking. The vulnerability was discovered using AI coding tools, lowering the barrier for uncovering security flaws—whether accidentally or maliciously—raising concerns about AI amplifying cyber risks. DJI patched […]
02/28/2026
/
By Kevin Hughes
Google exposes MASSIVE Chinese cyber espionage campaign targeting 42 countries
Google’s Threat Intelligence Group (GTIG) uncovered UNC2814 (Gallium), a Chinese-linked hacking group that infiltrated 53 organizations across 42 countries, stealing sensitive personal data and surveilling high-value targets, primarily in telecom and government sectors. The group used stealthy evasion techniques – including abusing Google Sheets API as a covert command-and-control channel – and deployed GRIDTIDE, a custom-built […]
02/27/2026
/
By Kevin Hughes
Orbs of Power: The terrifying truth behind UFOs and AI
According to the book “Orbs of Power”, mysterious orb-like objects have appeared frequently since 2017 near nuclear sites, power grids and water facilities. These objects defy physics—accelerating instantly, maneuvering impossibly, and vanishing underwater. Military witnesses report PTSD-like symptoms and face strict NDAs. Theories on their origin include: Black projects (Could be secret U.S. military tech, […]
« Return Home
1 of 23
Next Page »
Get Our Free Email Newsletter
Get independent news alerts on natural cures, food lab tests, cannabis medicine, science, robotics, drones, privacy and more.
Your privacy is protected.
Subscription confirmation required.
Popular Articles
Get Our Free Email Newsletter
Get independent news alerts on natural cures, food lab tests, cannabis medicine, science, robotics, drones, privacy and more.
Subscription confirmation required.
We respect your privacy
and do not share emails with anyone. You can easily unsubscribe at any time.
COPYRIGHT © 2017 COMPUTING NEWS
Privacy Policy
Get Our Free Email Newsletter
Get independent news alerts on natural cures, food lab tests, cannabis medicine, science, robotics, drones, privacy and more.
Subscription confirmation required.
We respect your privacy
and do not share emails with anyone. You can easily unsubscribe at any time.
Close
x
By continuing to browse our site you agree to our use of cookies and our
Privacy Policy
.
Agree and close