computing_logo
Sign in Join
    • My account
    • Sign out
  • You are currently accessing Computing via your Enterprise account.

    If you already have an account please use the link below to sign in.

    If you have any problems with your access or would like to request an individual access account please contact our customer service team.

    Phone: +44 (0) 1858 438800

    Email: customerservices@incisivemedia.com

    • Sign in
logo
  • logo

    Search Computing

     

     

  • Latest
  • Topics

    Choose a topic from the list below

    • Diversity in Tech
    • Big Data & Analytics
    • DevOps
    • Security
    • GDPR
    • AI & ML
    • Cloud & Infrastructure
    • CIO
    • Deskflix
  • Tech Impact
  • Diversity in Tech
  • Deskflix
  • Events
  • Whitepapers
  • More

    Most Popular content

    • Delta
    • Big Data & Analytics
    • Cloud
    • Leadership & Strategy
    • Open Source
    • Storage
    • Telecoms
    • Top 100 IT Leaders

    Featured content

    • On-demand webinars
    • Identity Access Management Hub
    • IT leaders 250
    • Research
    • Delta
    • Tech Marketing Hub

    Authors

    • Stuart Sumner
    • John Leonard
    • Tom Allen
    • Computing Contributors

    Computing Resources

    • English
    • Français
    • Deutsch
    • Espagnol
    • Italien
  • Searchlogo

    Search Computing

    x
Join Sign in
 
    • My account
    • Sign out
  • You are currently accessing Computing via your Enterprise account.

    If you already have an account please use the link below to sign in.

    If you have any problems with your access or would like to request an individual access account please contact our customer service team.

    Phone: +44 (0) 1858 438800

    Email: customerservices@incisivemedia.com

    • Sign in
    • Sign in

Threats and Risks

PyPI package 'ctx' and PHP library 'phpass' hijacked to obtain AWS keys

Threats and Risks

PyPI package 'ctx' and PHP library 'phpass' hijacked to obtain AWS keys

Both attacks appears to be the work of the same actor

clock 25 May 2022 • 3 min read
Microsoft warns of massive surge in Linux XorDdos malware usage

Threats and Risks

Microsoft warns of massive surge in Linux XorDdos malware usage

254% increase in activity of stealthy Linux XorDdos malware observed over the past six months

clock 23 May 2022 • 3 min read
Smart farm machines are weakness in food supply chains

Threats and Risks

Smart farm machines are weakness in food supply chains

Hackers could exploit flaws in modern 'smart' farm machinery to prevent them from operating, say experts.

clock 20 May 2022 • 3 min read
UK can lawfully launch cyberattacks against hostile states, says Attorney General

Threats and Risks

UK can lawfully launch cyberattacks against hostile states, says Attorney General

International law should apply in cyberspace, says Suella Braverman

clock 20 May 2022 • 3 min read
VMware fixes two new vulnerabilities, CISA orders federal agencies to patch immediately

Threats and Risks

VMware fixes two new vulnerabilities, CISA orders federal agencies to patch immediately

Bugs affecting Workspace ONE Access, VMware Identity Manager (vIDM), and vRealize Automation (vRA) should be patched immediately, VMware says

clock 19 May 2022 • 3 min read
SQL Server vulnerability - hackers using legitimate utility for fileless persistence

Threats and Risks

SQL Server vulnerability - hackers using legitimate utility for fileless persistence

The cyber actors behind the campaign are using brute force attacks for initial breach, according to Microsoft

clock 19 May 2022 • 3 min read
Tesla cars can be unlocked using inexpensive Bluetooth devices, researchers warn

Threats and Risks

Tesla cars can be unlocked using inexpensive Bluetooth devices, researchers warn

The flaw lies in Bluetooth Low Energy (BLE) technology

clock 19 May 2022 • 3 min read
Microsoft: Sysrv-K botnet targeting Windows and Linux

Threats and Risks

Microsoft: Sysrv-K botnet targeting Windows and Linux

Microsoft has issued a warning about a new botnet that installs a cryptocurrency miner to create digicash.

clock 18 May 2022 • 2 min read
Hackers can exploit iPhones' low-power mode to run malware even when device is off, researchers warn

Threats and Risks

Hackers can exploit iPhones' low-power mode to run malware even when device is off, researchers warn

Wireless chips in modern iPhones pose a new threat model

clock 17 May 2022 • 3 min read
Partner Content: Exclusive Q&A: Rubrik's James Blake on cyber attack recovery, ransoms and threat hunting

Threats and Risks

Partner Content: Exclusive Q&A: Rubrik's James Blake on cyber attack recovery, ransoms and threat hunting

clock 13 May 2022 • 6 min read
123
Most read
01

Dark data: "The dirty secret of the ICT sector"

27 June 2022 • 8 min read
02

Cyberattack stops all deliveries at Wiltshire Farm Foods

29 June 2022 • 2 min read
03

Apple accused of harming browser engine diversity

28 June 2022 • 3 min read
04

Eco-warriors: Microsoft Azure vs Amazon AWS on sustainability

29 June 2022 • 12 min read
05

Italian data protection authority warns against the use of Google Analytics

24 June 2022 • 3 min read
  • Contact us
  • Marketing Solutions
  • About The Channel Company
  • Privacy Settings
  • Terms & Conditions
  • Policies
  • Careers
FOLLOW US

© The Channel Company EMEA New London House, 172 Drury Lane, London WC2B 5QR.Registered in England and Wales with company registration number 14078896

Loading