computing_logo
Sign in Join
    • My account
    • Sign out
  • You are currently accessing Computing via your Enterprise account.

    If you already have an account please use the link below to sign in.

    If you have any problems with your access or would like to request an individual access account please contact our customer service team.

    Phone: +44 (0) 1858 438800

    Email: customerservices@incisivemedia.com

    • Sign in
logo
  • logo

    Search Computing

     

     

  • Latest
  • Topics

    Choose a topic from the list below

    • Diversity in Tech
    • Big Data & Analytics
    • DevOps
    • Security
    • GDPR
    • AI & ML
    • Cloud & Infrastructure
    • CIO
    • Deskflix
  • Tech Impact
  • Delta
  • Deskflix
  • Events
  • Whitepapers
  • More

    Most Popular content

    • Delta
    • Big Data & Analytics
    • Cloud
    • Leadership & Strategy
    • Open Source
    • Storage
    • Telecoms
    • Top 100 IT Leaders

    Featured content

    • On-demand webinars
    • Identity Access Management Hub
    • IT leaders 250
    • Research
    • Delta
    • Tech Marketing Hub

    Authors

    • Stuart Sumner
    • John Leonard
    • Tom Allen
    • Computing Contributors

    Computing Resources

    • English
    • Français
    • Deutsch
    • Espagnol
    • Italien
  • Searchlogo

    Search Computing

    x
Join Sign in
 
    • My account
    • Sign out
  • You are currently accessing Computing via your Enterprise account.

    If you already have an account please use the link below to sign in.

    If you have any problems with your access or would like to request an individual access account please contact our customer service team.

    Phone: +44 (0) 1858 438800

    Email: customerservices@incisivemedia.com

    • Sign in
    • Sign in

Security

US lawmakers urge Google to limit location tracking to protect women seeking abortion

Privacy

US lawmakers urge Google to limit location tracking to protect women seeking abortion

It comes ahead of the expected overturning of the 1973 decision by the US Supreme Court that safeguards a woman's right to have an abortion

clock 25 May 2022 • 3 min read
PyPI package 'ctx' and PHP library 'phpass' hijacked to obtain AWS keys

Threats and Risks

PyPI package 'ctx' and PHP library 'phpass' hijacked to obtain AWS keys

Both attacks appears to be the work of the same actor

clock 25 May 2022 • 3 min read
Developing: Cyberattack affects Port of London website

Security

Developing: Cyberattack affects Port of London website

A suspected Iranian group has launched a DDoS attack against the Port of London's website, which is still down at the time of writing.

clock 24 May 2022 • 1 min read
Microsoft warns of massive surge in Linux XorDdos malware usage

Threats and Risks

Microsoft warns of massive surge in Linux XorDdos malware usage

254% increase in activity of stealthy Linux XorDdos malware observed over the past six months

clock 23 May 2022 • 3 min read
Smart farm machines are weakness in food supply chains

Threats and Risks

Smart farm machines are weakness in food supply chains

Hackers could exploit flaws in modern 'smart' farm machinery to prevent them from operating, say experts.

clock 20 May 2022 • 3 min read
Application security: shift-left is necessary but insufficent

DevOps

Application security: shift-left is necessary but insufficent

Integrating security checks into code should be seen as part of a bigger picture, says Kubecon panel

clock 20 May 2022 • 4 min read
UK can lawfully launch cyberattacks against hostile states, says Attorney General

Threats and Risks

UK can lawfully launch cyberattacks against hostile states, says Attorney General

International law should apply in cyberspace, says Suella Braverman

clock 20 May 2022 • 3 min read
VMware fixes two new vulnerabilities, CISA orders federal agencies to patch immediately

Threats and Risks

VMware fixes two new vulnerabilities, CISA orders federal agencies to patch immediately

Bugs affecting Workspace ONE Access, VMware Identity Manager (vIDM), and vRealize Automation (vRA) should be patched immediately, VMware says

clock 19 May 2022 • 3 min read
SQL Server vulnerability - hackers using legitimate utility for fileless persistence

Threats and Risks

SQL Server vulnerability - hackers using legitimate utility for fileless persistence

The cyber actors behind the campaign are using brute force attacks for initial breach, according to Microsoft

clock 19 May 2022 • 3 min read
Tesla cars can be unlocked using inexpensive Bluetooth devices, researchers warn

Threats and Risks

Tesla cars can be unlocked using inexpensive Bluetooth devices, researchers warn

The flaw lies in Bluetooth Low Energy (BLE) technology

clock 19 May 2022 • 3 min read
123
Most read
01

Microsoft warns of massive surge in Linux XorDdos malware usage

23 May 2022 • 3 min read
02

Developing: Cyberattack affects Port of London website

24 May 2022 • 1 min read
03

Google Russia to file for bankruptcy after accounts seized

20 May 2022 • 2 min read
04

Application security: shift-left is necessary but insufficent

20 May 2022 • 4 min read
05

Full steam ahead for new Trainline CTO Milena Nikolic

24 May 2022 • 4 min read
  • Contact Us
  • Marketing Solutions
  • About Incisive Media
  • Privacy Settings
  • Terms & Conditions
  • Policies
  • Careers
FOLLOW US
right wallpaper ad

© Incisive Business Media (IP) Limited, Published by Incisive Business Media Limited,New London House, 172 Drury Lane, London WC2B 5QR.Registered in England and Wales with company registration numbers 09177174 & 09178013

DIGITAL PUBLISHER OF THE YEAR
right wallpaper ad
Loading