• Home
  • News
  • Big Data & Analytics
  • DevOps
  • Security
  • GDPR
  • AI & ML
  • Women in Tech
  • Cloud & Infrastructure
  • CIO
  • Deskflix
  • Events
  • Whitepapers
  • Spotlights
  • IT Leaders 250
  • Research
  • Delta
  • Tech Marketing Hub
  • About Us
  • Newsletters
  • Sign in
  •  
      • Newsletters
      • Account details
      • Contact support
      • Sign out
     
     
    • You are currently accessing Computing via your Enterprise account.

      If you already have an account please use the link below to sign in.

      If you have any problems with your access or would like to request an individual access account please contact our customer service team.

      Phone: +44 (0) 1858 438800

      Email: customerservices@incisivemedia.com

      • Sign in
     
  • Follow us
    • Twitter
    • LinkedIn
    • Newsletters
    • Facebook
    • YouTube
  • Register
  • Events
    • Upcoming events
      event logo
      Good listeners: Why conversational interfaces are now a must-have

      This webinar, featuring dedicated research, will explore how conversational interfaces can add value to your digital initiatives today. We discuss the benefits of putting the AI to work and the value of the conversational channel itself.

      • Date: 17 Mar 2021
      • Virtual Event,
      event logo
      Deskflix IT Leader's Summit

      Six months on from our inaugural IT Leaders’ Festival, Deskflix IT Leaders’ Summit is a chance to take stock and reflect on the first quarter of 2021. How did you overcome the obstacles of 2020? Was progression as expected? What were your biggest threats and biggest growth opportunities?

      • Date: 24 Mar 2021
      event logo
      Architect for the unknown: Is your database built for a crisis?

      This webinar, in which we’ll reveal Computing’s latest research in this area, reflects on how prepared our respondents’ data architecture was going into the pandemic and the role databases have to play in the ability to react and pivot in a crisis.

      • Date: 25 Mar 2021
      event logo
      AI & Machine Learning Awards 2021

      The Computing AI & Machine Learning Awards recognise the best companies, individuals, and projects in the AI space today. The awards cover every corner of the industry: security, ethics, data analysis, innovation and more, as well as showcasing the movers and shakers: the technology heroes and projects that deserve industry-wide praise. The winners will be announced in London on 1 July 2020. Entries are now open!

      • Date: 09 Jun 2021
      • TBC, London
      View all events
  • Whitepapers
    • LATEST WHITEPAPERS
      Darktrace 120x194
      Cyber AI Response: Threat Report 2019

      This white paper details 7 case studies of attacks that were intercepted and neutralised by Darktrace cyber defense AI, including a zero-day trojan in a manufacturing company's network. Learn how Darktrace Antigena AI Response modules fight back autonomously, no matter where a threat may emerge, extending to the Cloud, Email and SaaS.

      Download
      Darktrace 120x194
      Cyber AI & Darktrace Cloud

      This white paper explores how cloud is a security blind spot for many organisations who struggle with the limited visibility and control in this new environment, where their existing security tools are often not applicable.

      Download
      Find whitepapers
      Search by title or subject area
      View all whitepapers
  • Spotlights
    • Spotlights

      Welcome to Computing's Spotlight section, where we focus in on particularly important themes and topics of enterprise IT.

      Intel logo

       

      Endpoint Management and Security Hub

  • IT Leaders 250
  • Research
  • Delta
  • Tech Marketing Hub
  • About Us
Computing
Computing
  • Home
  • News
  • Big Data & Analytics
  • DevOps
  • Security
  • GDPR
  • AI & ML
  • Women in Tech
  • Cloud & Infrastructure
  • CIO
  • Deskflix
 
    • Newsletters
    • Account details
    • Contact support
    • Sign out
 
 
  • You are currently accessing Computing via your Enterprise account.

    If you already have an account please use the link below to sign in.

    If you have any problems with your access or would like to request an individual access account please contact our customer service team.

    Phone: +44 (0) 1858 438800

    Email: customerservices@incisivemedia.com

    • Sign in
 
  • Threats and Risks

There is a massive hole in IoT security, says Avast researcher

Poorly-configured protocols are leaving whole networks open to attackers

The IoT’s convenience is a double-edged sword
The IoT’s convenience is a double-edged sword
  • Tom Allen
  • Tom Allen
  • 17 August 2018
  • Tweet  
  • Facebook  
  • LinkedIn  
  • Send to  
0 Comments

Avast security researcher Martin Hron has revealed a gaping hole in the security of Internet of Things (IoT) devices. We've written in the past about the vulnerabilities in leaving these products with...

To continue reading...

Sign In

Export Load
Forgot your password?

Having trouble logging in? First try resetting your password
Reset now

Alternatively, contact our customer service team
Tel: +44 (0)1858 438 427
Email: incisive@subscription.co.uk

Don't have an account?

Computing helps IT leaders to make technology a revenue and innovation engine for their businesses. Our unique package of news and analysis enables you to discover what the smartest minds in the industry are doing and scan the horizon for what’s next

  • REAL-TIME NEWS AND ANALYSIS: find out what’s happening and why in the technology space including news on your competitors and regulators – delivered to your desktop or mobile in a daily newsletter
  • MARKET TRENDS: learn about the implications for you of the latest shifts in everything from AI to machine learning and blockchains – evaluated in a new monthly editor’s newsletter for CIOs
  • CIO INTERVIEWS: find out what fellow IT leaders are doing and why

Register

More on Threats and Risks

Gootloader malware platform is tricking search engines to compromise systems
Google SEO algorithm tricked by malware to legitimise fake sites

It is actively delivering malicious payloads through highly-focused campaigns in the US, South Korea and Germany

  • Threats and Risks
  • 03 March 2021
CVSS assigns severity score of 10.0 to Rockwell controller vulnerability
CVSS assigns severity score of 10.0 to Rockwell controller vulnerability

"Tracking PLC components to fix the problem will be hard," said one commentator

  • Threats and Risks
  • 02 March 2021
GCHQ will use AI to combat child abuse and human trafficking
GCHQ will use AI to combat child abuse and human trafficking

GCHQ has committed to using AI in a 'fair and transparent' way

  • Threats and Risks
  • 26 February 2021
Code of China-linked Jian spyware was copied from America's NSA, researchers
China-linked Jian spyware was copied from NSA code, researchers

The APT31 group cloned a cyber-offensive tool developed by the NSA to create Jian, which was then used against a US target

  • Threats and Risks
  • 23 February 2021
'Silent stealing' sees cyber fraudsters targeting people for as little as £10
'Silent stealing': cyber fraudsters expand mass, low-return operations in the pandemic

Criminals are targeting hundreds of thousands of individuals for as little as £10, reasoning that such thefts are less likely to be reported

  • Threats and Risks
  • 22 February 2021
Back to Top
  • Contact
  • Delta
  • Marketing solutions
  • Enterprise IT Events
  • Incisive Media
  • Terms & conditions
  • Policies
  • Careers
  • Privacy Settings
  • Twitter
  • LinkedIn
  • Newsletters
  • Facebook
  • YouTube

im_logo

© Incisive Business Media (IP) Limited, Published by Incisive Business Media Limited, New London House, 172 Drury Lane, London WC2B 5QR, registered in England and Wales with company registration numbers 09177174 & 09178013

Digital publisher of the year
Digital publisher of the year 2010, 2013, 2016 & 2017
Loading