Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Jikipedia turns Epstein’s emails into an encyclopedia of his powerful friends

    iBuyPower’s gaming desktops are discounted for Presidents Day

    Georgia Tech announced the finalists in its wild musical instrument competition

    Facebook X (Twitter) Instagram
    • Artificial Intelligence
    • Business Technology
    • Cryptocurrency
    • Gadgets
    • Gaming
    • Health
    • Software and Apps
    • Technology
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Tech AI Verse
    • Home
    • Artificial Intelligence

      Read the extended transcript: President Donald Trump interviewed by ‘NBC Nightly News’ anchor Tom Llamas

      February 6, 2026

      Stocks and bitcoin sink as investors dump software company shares

      February 4, 2026

      AI, crypto and Trump super PACs stash millions to spend on the midterms

      February 2, 2026

      To avoid accusations of AI cheating, college students are turning to AI

      January 29, 2026

      ChatGPT can embrace authoritarian ideas after just one prompt, researchers say

      January 24, 2026
    • Business

      The HDD brand that brought you the 1.8-inch, 2.5-inch, and 3.5-inch hard drives is now back with a $19 pocket-sized personal cloud for your smartphones

      February 12, 2026

      New VoidLink malware framework targets Linux cloud servers

      January 14, 2026

      Nvidia Rubin’s rack-scale encryption signals a turning point for enterprise AI security

      January 13, 2026

      How KPMG is redefining the future of SAP consulting on a global scale

      January 10, 2026

      Top 10 cloud computing stories of 2025

      December 22, 2025
    • Crypto

      US Investors Might Be Leaving Bitcoin and Ethereum ETFs for International Markets

      February 14, 2026

      Binance France President Targeted in Armed Kidnapping Attempt

      February 14, 2026

      Binance Fires Investigators as $1 Billion Iran-Linked USDT Flows Surface

      February 14, 2026

      Aave Proposes 100% DAO Revenue Model, Yet Price Remains Under Pressure

      February 14, 2026

      A $3 Billion Credit Giant Is Testing Bitcoin in the Mortgage System — Here’s How

      February 14, 2026
    • Technology

      Jikipedia turns Epstein’s emails into an encyclopedia of his powerful friends

      February 15, 2026

      iBuyPower’s gaming desktops are discounted for Presidents Day

      February 15, 2026

      Georgia Tech announced the finalists in its wild musical instrument competition

      February 15, 2026

      My uncanny AI valentines

      February 15, 2026

      A powerful tool of resistance is already in your hands

      February 15, 2026
    • Others
      • Gadgets
      • Gaming
      • Health
      • Software and Apps
    Check BMI
    Tech AI Verse
    You are at:Home»Technology»Internet Providers Can Monitor Their Own Cybersecurity Standards, Says Trump’s FCC
    Technology

    Internet Providers Can Monitor Their Own Cybersecurity Standards, Says Trump’s FCC

    TechAiVerseBy TechAiVerseNovember 21, 2025No Comments5 Mins Read3 Views
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Reddit
    Internet Providers Can Monitor Their Own Cybersecurity Standards, Says Trump’s FCC
    Share
    Facebook Twitter LinkedIn Pinterest WhatsApp Email

    Internet Providers Can Monitor Their Own Cybersecurity Standards, Says Trump’s FCC

    Internet service providers and cellular carriers will no longer be required to meet minimum cybersecurity standards after a Federal Communications Commission vote Thursday. 

    The FCC voted 2-1 along party lines to reverse course on a January ruling — adopted four days before President Donald Trump’s inauguration — that required providers to issue an annual certification showing that they have “created, updated and implemented a cybersecurity risk management plan.” 

    The rules applied to a broad range of companies, including cellular carriers, internet service providers, radio stations and even television broadcasters.

    The new requirements were largely a response to the Salt Typhoon cyberattackin September last year, in which hackers linked to the Chinese government broke into the networks of US internet providers like AT&T, Verizon and Lumen, which owns CenturyLink and Quantum Fiber. Attackers gained access to millions of customers’ call and text message metadata and reportedly captured audio recordings from people involved with both the Harris and Trump campaigns.

    “This is such a terrible idea. This is rolling out the red carpet for another attack,” Cooper Quintin, a senior staff technologist at the Electronic Frontier Foundation, told CNET. “I can’t overstate how impactful Salt Typhoon was. This gave them access to the communications of every American. It impacted everyone, and there were no consequences for the telcos other than having to generate a regular report.”

    So why roll back the rules now? FCC Chair Brendan Carr said the rules are not necessary because longer providers have already “demonstrated a strengthened cybersecurity posture” in the year since the Salt Typhoon attacks. 

    The move is the latest chapter in Carr’s “Delete, Delete, Delete” agenda, which aims to end the “regulatory onslaught from Washington.”

    Objections from Democrats came swiftly. Mark Warner, the vice chairman of the Senate Select Committee on Intelligence, said the elimination of requirements “leaves us without a credible plan to address the gaps exposed by Salt Typhoon, including basic failures like credential reuse and the absence of multi-factor authentication for highly privileged accounts.” 

    In a letter to Carr earlier this week, Sen. Maria Cantwell said that the Salt Typhoon allowed the Chinese government to “geolocate millions of individuals” and “record phone calls at will,” noting that the incident targeted almost every American.

    “You have now proposed to reverse this requirement after heavy lobbying from the very telecommunications carriers whose networks were breached by Chinese hackers,” Cantwell said.

    Carr waved off these objections at this morning’s meeting, saying, “Doing anything just so we can say we did something is not the answer.”

    Blair Levin, a former FCC chief of staff and a telecom industry analyst at New Street Research, told me that he found Carr’s position counterintuitive. 

    “If you look at the FCC as being the protector of the public interest in modern communications, the notion that you don’t have a role in cybersecurity strikes me as being willfully blunt,” Levin said.

    The ruling is a major win for telecom companies, which have lobbied for the rules to be rescinded. In a letter sent to the FCC last month, industry groups argued that the decades-long cybersecurity collaboration between industry and government meant the rules weren’t just unnecessary — they “significantly undermine this system and make our networks less safe.”

    When I read this quote to Quintin, he laughed and dismissed it with a seven-letter word.

    “If having to report to somebody what their cybersecurity posture is makes them less secure, then they had terrible cybersecurity,” he said.

    Don’t miss any of our unbiased tech content and lab-based reviews. Add CNET as a preferred Google source.

    How to protect yourself from future cyberattacks

    The FCC is taking a step back in monitoring the security of our networks, which means it’s never been more essential to practice good cybersecurity yourself. While Salt Typhoon targeted government officials, everyday Americans could be at risk in future attacks.

    “The concern for you or me is more around scams and cybercrime,” said Quintin, noting that SIM swapping attacks, intercepting two-factor authentication codes and scammers posing as your bank or healthcare provider could become more common.

    Here are a few steps you can take right now to protect yourself and mitigate the potential damage:

    Set strong passwords and always use multifactor authentication. Your passwords should all be unique and long, with a variety of special characters, letters and numbers. If that sounds impossible to remember, it should be. A good password manager will do the heavy lifting for you. If you learn that one of your passwords has been compromised in a breach, change it as soon as possible.

    Look out for phishing attacks. Data breaches give criminals a great opportunity to use your personal details against you by sending scam emails, text messages or social media messages. Don’t click on links from senders you don’t recognize, and be extremely skeptical about handing out money or personal information to any person or company you haven’t vetted.

    Monitor your financial accounts. It’s always a good idea to keep a close eye on your bank accounts and credit cards, but especially when you’re notified that your personal information has been exposed. You can also set up account alerts to let you know whenever a large transaction has gone through. 

    Use a VPN. If you’re concerned about another Salt Typhoon-style attack from a foreign government or anyone else, the single best thing you can do to ensure your connection remains private is to use a trustworthy VPN. Look for advanced features like obfuscation, Tor over VPN and a double VPN, which uses a second VPN server for an added layer of encryption. You can also install a VPN on your router directly so that all your traffic is encrypted automatically.

    Share. Facebook Twitter Pinterest LinkedIn Reddit WhatsApp Telegram Email
    Previous ArticleRobots at Home: Are Teleoperated Humanoids Really as Scary as They Seem?
    Next Article Today’s NYT Mini Crossword Answers for Friday, Nov. 21
    TechAiVerse
    • Website

    Jonathan is a tech enthusiast and the mind behind Tech AI Verse. With a passion for artificial intelligence, consumer tech, and emerging innovations, he deliver clear, insightful content to keep readers informed. From cutting-edge gadgets to AI advancements and cryptocurrency trends, Jonathan breaks down complex topics to make technology accessible to all.

    Related Posts

    Jikipedia turns Epstein’s emails into an encyclopedia of his powerful friends

    February 15, 2026

    iBuyPower’s gaming desktops are discounted for Presidents Day

    February 15, 2026

    Georgia Tech announced the finalists in its wild musical instrument competition

    February 15, 2026
    Leave A Reply Cancel Reply

    Top Posts

    Ping, You’ve Got Whale: AI detection system alerts ships of whales in their path

    April 22, 2025673 Views

    Lumo vs. Duck AI: Which AI is Better for Your Privacy?

    July 31, 2025260 Views

    6.7 Cummins Lifter Failure: What Years Are Affected (And Possible Fixes)

    April 14, 2025153 Views

    6 Best MagSafe Phone Grips (2025), Tested and Reviewed

    April 6, 2025112 Views
    Don't Miss
    Technology February 15, 2026

    Jikipedia turns Epstein’s emails into an encyclopedia of his powerful friends

    Jikipedia turns Epstein’s emails into an encyclopedia of his powerful friendsTerrence O’Brien is the Verge’s…

    iBuyPower’s gaming desktops are discounted for Presidents Day

    Georgia Tech announced the finalists in its wild musical instrument competition

    My uncanny AI valentines

    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    About Us
    About Us

    Welcome to Tech AI Verse, your go-to destination for everything technology! We bring you the latest news, trends, and insights from the ever-evolving world of tech. Our coverage spans across global technology industry updates, artificial intelligence advancements, machine learning ethics, and automation innovations. Stay connected with us as we explore the limitless possibilities of technology!

    Facebook X (Twitter) Pinterest YouTube WhatsApp
    Our Picks

    Jikipedia turns Epstein’s emails into an encyclopedia of his powerful friends

    February 15, 20263 Views

    iBuyPower’s gaming desktops are discounted for Presidents Day

    February 15, 20264 Views

    Georgia Tech announced the finalists in its wild musical instrument competition

    February 15, 20263 Views
    Most Popular

    7 Best Kids Bikes (2025): Mountain, Balance, Pedal, Coaster

    March 13, 20250 Views

    VTOMAN FlashSpeed 1500: Plenty Of Power For All Your Gear

    March 13, 20250 Views

    This new Roomba finally solves the big problem I have with robot vacuums

    March 13, 20250 Views
    © 2026 TechAiVerse. Designed by Divya Tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms & Conditions

    Type above and press Enter to search. Press Esc to cancel.