computing_logo
Sign in Join
    • My account
    • Sign out
  • You are currently accessing Computing via your Enterprise account.

    If you already have an account please use the link below to sign in.

    If you have any problems with your access or would like to request an individual access account please contact our customer service team.

    Phone: +44 (0) 1858 438800

    Email: customerservices@incisivemedia.com

    • Sign in
logo
  • logo

    Search Computing

     

     

  • Latest
  • Topics

    Choose a topic from the list below

    • Diversity in Tech
    • Big Data & Analytics
    • DevOps
    • Security
    • GDPR
    • AI & ML
    • Cloud & Infrastructure
    • CIO
    • Deskflix
  • Tech Impact
  • Delta
  • Deskflix
  • Events
  • Whitepapers
  • More

    Most Popular content

    • Delta
    • Big Data & Analytics
    • Cloud
    • Leadership & Strategy
    • Open Source
    • Storage
    • Telecoms
    • Top 100 IT Leaders

    Featured content

    • On-demand webinars
    • Identity Access Management Hub
    • IT leaders 250
    • Research
    • Delta
    • Tech Marketing Hub

    Authors

    • Stuart Sumner
    • John Leonard
    • Tom Allen
    • Computing Contributors

    Computing Resources

    • English
    • Français
    • Deutsch
    • Espagnol
    • Italien
  • Searchlogo

    Search Computing

    x
Join Sign in
 
    • My account
    • Sign out
  • You are currently accessing Computing via your Enterprise account.

    If you already have an account please use the link below to sign in.

    If you have any problems with your access or would like to request an individual access account please contact our customer service team.

    Phone: +44 (0) 1858 438800

    Email: customerservices@incisivemedia.com

    • Sign in
    • Sign in

Security

Ex-Amazon worker found guilty in Capital One breach

Hacking

Ex-Amazon worker found guilty in Capital One breach

Paige Thompson built a tool to find vulnerable AWS accounts, exfiltrate data and plant cryptomining software

clock 21 June 2022 • 3 min read
Identify your "vital ground" or your cyber effort is wasted

Security

Identify your "vital ground" or your cyber effort is wasted

And the road to recovery is to plan, plan and plan again

clock 16 June 2022 • 3 min read
In modern war, we have as much to fear from cyber weapons as kinetics

Security

In modern war, we have as much to fear from cyber weapons as kinetics

The physical world is past the point of no return when it comes to dependence on technology, says Ian Hill

clock 16 June 2022 • 3 min read
Hertzbleed vulnerabiity in AMD and Intel CPUs could leak cryptographic keys

Threats and Risks

Hertzbleed vulnerabiity in AMD and Intel CPUs could leak cryptographic keys

Intel says an attack probably wouldn't work outside a lab environment

clock 16 June 2022 • 2 min read
Ransomware gang deploys BlackCat to attack hotel and creates searchable website of hacked data

Security

Ransomware gang deploys BlackCat to attack hotel and creates searchable website of hacked data

Cyber-criminal groups have recently ramped up their use of Ransomware-as-a-Service (RaaS) BlackCat/ALPHA-V, first identified by security researchers in November 2021, and upped the ante by publishing the hacked data on a dedicated website.

clock 15 June 2022 • 1 min read
Follina fixed in Microsoft Patch Tuesday update

Security

Follina fixed in Microsoft Patch Tuesday update

54 other vulnerabilities, three Critical, also patched in Microsoft's June update

clock 14 June 2022 • 1 min read
Anonymous claims hack on Russian drones

Hacking

Anonymous claims hack on Russian drones

This attack is the group's first on the Russian military itself

clock 14 June 2022 • 2 min read
Follina flaw being exploited by Russian hackers, info stealers

Threats and Risks

Follina flaw being exploited by Russian hackers, info stealers

Reports of Ukrainian media organisations receiving emails with compromised Word docs, and AsyncRAT Trojan delivered by groups exploiting the unpatched flaw

clock 14 June 2022 • 2 min read
Symbiote: credential-stealing Linux back door that's nearly impossible to detect

Threats and Risks

Symbiote: credential-stealing Linux back door that's nearly impossible to detect

Sophisticated malware uses a variety of methods to evade detection

clock 13 June 2022 • 2 min read
Okta eats own dog food on WFH, tightens supplier access after Lapsus$ breach

Security

Okta eats own dog food on WFH, tightens supplier access after Lapsus$ breach

Okta contracts are 100% work from home, says senior solutions engineer Craig Hinchliffe

clock 13 June 2022 • 2 min read
123
Most read
01

Dark data: "The dirty secret of the ICT sector"

27 June 2022 • 8 min read
02

Yodel experiencing service disruption following cyberattack

22 June 2022 • 3 min read
03

Microsoft resolves service outage affecting Teams and Exchange Online

22 June 2022 • 3 min read
04

ERP and the slow road to the cloud

22 June 2022 • 8 min read
05

Apple accused of harming browser engine diversity

28 June 2022 • 3 min read
  • Contact Us
  • Marketing Solutions
  • About Incisive Media
  • Privacy Settings
  • Terms & Conditions
  • Policies
  • Careers
FOLLOW US
right wallpaper ad

© Incisive Business Media (IP) Limited, Published by Incisive Business Media Limited,New London House, 172 Drury Lane, London WC2B 5QR.Registered in England and Wales with company registration numbers 09177174 & 09178013

DIGITAL PUBLISHER OF THE YEAR
right wallpaper ad
Loading