Articles by Nicholas Fearn
Focus on 'customer experience' - or lose customers
Former NHBC and City University CIO Carl Stokes tells Computing why customer experience should be a priority - and how organisations ought to do it
Death of the keyboard and mouse: How human-computer interfaces are evolving
The keyboard and mouse is already giving way to human-computer interfaces that could once only have been seen in sci-fi films, writes Nic Fearn
Should security shift from defence to containing attacks?
The risks of cyber attack are more than doubling every year. So should CIOs and CISOs rethink how they organise IT security, Nic Fearn asks
How Ted Baker's digital transformation helped drive sales
Global retailer Ted Baker found that its ecommerce platform alone wasn't sufficient to satisfy demanding customers in today's competitive environment
Bridging the gap: Can DevOps help embed security into app development?
DevOps is designed to bring developers and operations more closely together. Ahead of Cyber Security Live later this month, Nic Fearn asks: Can it also encompass security as well?
Who 'owns' cyber security?
Ahead of Cyber Security Live later this month, Nic Fearn asks: With cyber crime rocketing, who in your organisation should have ultimately 'ownership' of IT security?
How Quantum technology could transform computing - perhaps…
There's still some time - and a number of challenges to overcome - before quantum computing becomes truly useful, reports Nic Fearn
How PSD2 will affect payments for banks and business
Nic Feare examines the changes that the Revised Directive on Payment Services (PSD2) will make to banking and business
How greater 'neurodiversity' could improve cyber security and help overcome IT skills shortages
Cyber security needs specialists who really can 'think different'
The outer limits? What will happen when microprocessors reach 'silicon plateau'?
As copper and silicon-based CPUs reach their physical limits, what is in the pipeline that will keep compute power growing? Nic Fearn investigates
APIs are 'rich targets' for hackers, warn security researchers
Researchers at F5 Labs claim that APIs have become an easy target for hackers.
Capital One hacker may have hacked more than 30 other companies, claim prosecutors
Paige Thompson could face up to five years in prison if found guilty
Amazon quizzed over AWS security following Capital One leak
House of Representatives committee plans to quiz Amazon over AWS security following Capital One data breach
Public key spamming issue remains unfixed: Why is Tor so quiet about it?
We tried downloading the keyserver-crashing 0x4E2C6E8793298290 but it's still 'too large' to import
New laws proposed in the US to protect technology supply chains from espionage
New law is intended to crack down on alleged espionage by China against US infrastructure and intellectual property
Whistleblower wins $9m over surveillance software Cisco knew was bug-ridden
Cisco has agreed to an $8.6 million settlement over claims it sold vulnerable software to US government agencies
Hackers can bypass verification limits on Visa cards
Researchers have described the findings as "significant" and called on banks to improve contactless payment card security
How Leeds Building Society plans to achieve diversity in tech
Leeds' Becky Hewitt talks about some of the initiatives the building society has adopted to achieve its target of 33 per cent of women holding senior leadership roles by 2021
Malware attacks down by 20 per cent, while ransomware-as-a-service has boomed
Ransomware-as-a-service attacks on UK organisations have tripled over the past year, claims SonicWall
New 'highly targeted' mobile malware, dubbed 'Monokle', linked to Russian hackers
Researchers believe the malware was created by STC, a Russian company accused of interfering in the 2016 US presidential election
Microsoft has updated its Windows 10 servicing model
Microsoft claims that the changes will allow it to gain better feedback on its releases
Facebook expected to settle with FTC today, paying $5bn over data handling and agreeing to new controls
The FTC is expected to announce the agreement on Wednesday
Apple to release three new iPhones this year
New Apple iPhones with A14 chip, and improved cameras and displays are expected to be unveiled in September
Microsoft revenues up by 12 per cent driven by Azure cloud growth
Cloud - and Office 365 in particular - drove revenues up again, but Xbox hardware sales tanked
BlackBerry Cylance AI-based anti-virus 'tricked' into passing malware off as safe
Researchers were able to trick a popular AI system into thinking ten of the most dangerous forms of malware were good.
Trump concerned about $10bn Pentagon cloud computing contract
Trump could stop JEDI cloud contract over competition concerns as bidding comes down Microsoft versus Amazon
Thousands of Windows users targeted by nation state attacks, says Microsoft
The majority of the attacks originate from Iran, North Korea and Russia, and took place in the past year
BMC firmware weaknesses put popular servers at risk - updated
Security flaws identified by Eclypsium have since been mitigated by manufacturers
Russia-linked Turla APT revamps arsenal to avoid detection with fileless malware
The hacking group has developed new forms of malware to avoid detection from software programs such as VPNs.
US charges Chinese software engineer for theft of trade secrets
William Yao could face up to ten years in prison if convicted - if he returns from China
Magecart hackers infect over 17,000 web domains
Security researchers believe the scale of Magecart compromise is far larger than previously thought
Warning over 12 new security flaws found in industrial control systems
ICS flaws highlighted by Tenable come a decade after the Stuxnet worm targeted an Iranian uranium enrichment plant
25 million Android devices infected by new malware variant dubbed 'Agent Smith'
'Agent Smith' malware replaces legitimate applications with malicious versions
Unsecured database containing 188 million personal records discovered online
Yet another trove of unsecured personal data uncovered - this time containing information from data brokers Pipl.com and LexisNexis
Government's digital strategy has lost momentum, claims Science and Technology Committee report
MPs slam government's faltering digital strategy
Facebook fixes global outage across social platforms
The outage affected Facebook, Ingstagram, WhatsApp and Messenger users globally
US plan to use "retro" technology to bolster power grid defences
Securing Energy Infrastructure Act plan will use low-tech used to improve the US power grid's cyber defences
G-Cloud 11 goes live with 4,200 suppliers onboard
Launch of G-Cloud 11 comes as over £4bn has been spent on IT procurement by public sector bodies via the service
Researchers discover vulnerability in the Microsoft Excel tool
Excel spreadsheet vulnerability enables cyber criminals to launch attacks on unwitting users
Met police face enforcement order over data request handling
The ICO has given Met officials until September to implement appropriate measures
NHS Wales to overhaul IT systems through Microsoft deal
The rollout will begin next month and provide over 100,000 NHS Wales staff with access to modern workplace tools.
MPs launch electronic waste and circular economy inquiry
Politicians will explore the true extent of the UK's e-waste problem and how a circular economy can be created for electronic goods.
Tesla Model 3 navigation security flaw enables hackers to take control of Autopilot
Sat Nav spoofing is a growing threat to in-car driver assistance systems and autonomous vehicles, warns Regulus
Java and JavaScript the most used programming languages, but Azure is giving way to Google, says survey
The report shines a light on the biggest development trends of 2019
UK Government unveils security standard for surveillance cameras
The standard aims to combat attacks launched by infected camera systems
Unauthorised Raspberry Pi allowed hackers to compromise NASA's systems
A recent audit has unveiled a series of security errors at NASA
Saudi cyber team tried to hack the Guardian following Jamal Khashoggi death
Journalists have been told to protect themselves.
Netflix warns of several new TCP networking vulnerabilities
The vulnerabilities relate to the MSS and TCP SACK capabilities