Cyber attacks - up close and personal

John Leonard
clock • 6 min read

Cyber criminals have changed tactics. It's up to the IT department to let everyone know

Absolute security is an absolute impossibility - and getting more impossible by the year. The traditional model of building a strong-room around the company crown jewels is certainly no longer s...

To continue reading this article...

Join Computing

  • Unlimited access to real-time news, analysis and opinion from the technology industry
  • Receive important and breaking news in our daily newsletter
  • Be the first to hear about our events and awards programmes
  • Join live member only interviews with IT leaders at the ‘IT Lounge’; your chance to ask your burning tech questions and have them answered
  • Access to the Computing Delta hub providing market intelligence and research
  • Receive our members-only newsletter with exclusive opinion pieces from senior IT Leaders

Join now

 

Already a Computing member?

Login

You may also like
UK data regulator finds gaps in Google's Privacy Sandbox proposals

Privacy

Concerns shared with the Competition and Markets Authority

clock 22 April 2024 • 3 min read
Leicester Council confirms ransomware attack

Hacking

Hackers are now publishing stolen data

clock 05 April 2024 • 3 min read
Massive data leak exposes Chinese infosec vendor's cyberattacks-for-hire

Threats and Risks

Documents outline the use of hardware hacking devices, including a malicious power bank designed to surreptitiously upload data into victims' systems

clock 23 February 2024 • 3 min read

More on Threats and Risks

Leicester streetlights on day and night following cyber-attack

Leicester streetlights on day and night following cyber-attack

Effects of ‘highly sophisticated’ breach still being felt

Penny Horwood
clock 25 April 2024 • 1 min read
Mandiant's 2024 threat report - five takeaways

Mandiant's 2024 threat report - five takeaways

Latest M-Trends report details how ransomware, zero-day attacks and other threats evolved last year.

Kyle Alspach
clock 24 April 2024 • 5 min read
ToddyCat cybercriminals using high-end tools to commit 'industrial scale' theft

ToddyCat cybercriminals using high-end tools to commit 'industrial scale' theft

ToddyCat restrict access to compromised systems while they steal valuable data.

Muskan Arora
clock 23 April 2024 • 2 min read