• Home
  • News
  • Big Data & Analytics
  • DevOps
  • Security
  • GDPR
  • AI & ML
  • Women in Tech
  • Cloud & Infrastructure
  • CIO
  • Deskflix
  • Events
  • Whitepapers
  • Spotlights
  • IT Leaders 250
  • Research
  • Delta
  • Tech Marketing Hub
  • About Us
  • Newsletters
  • Sign in
  •  
      • Newsletters
      • Account details
      • Contact support
      • Sign out
     
     
    • You are currently accessing Computing via your Enterprise account.

      If you already have an account please use the link below to sign in.

      If you have any problems with your access or would like to request an individual access account please contact our customer service team.

      Phone: +44 (0) 1858 438800

      Email: customerservices@incisivemedia.com

      • Sign in
     
  • Follow us
    • Twitter
    • LinkedIn
    • Newsletters
    • Facebook
    • YouTube
  • Register
  • Events
    • Upcoming events
      event logo
      Deskflix Financial Services

      oin us for this episode of Deskflix to hear from industry experts and peers on their 2020 best practices, what they’ve learnt for 2021 and how they plan to overcome the next wave of disruption.

      • Date: 03 Mar 2021
      event logo
      Good listeners: Why conversational interfaces are now a must-have

      This webinar, featuring dedicated research, will explore how conversational interfaces can add value to your digital initiatives today. We discuss the benefits of putting the AI to work and the value of the conversational channel itself.

      • Date: 17 Mar 2021
      • Virtual Event,
      event logo
      Deskflix IT Leader's Summit

      Six months on from our inaugural IT Leaders’ Festival, Deskflix IT Leaders’ Summit is a chance to take stock and reflect on the first quarter of 2021. How did you overcome the obstacles of 2020? Was progression as expected? What were your biggest threats and biggest growth opportunities?

      • Date: 24 Mar 2021
      event logo
      Architect for the unknown: Is your database built for a crisis?

      This webinar, in which we’ll reveal Computing’s latest research in this area, reflects on how prepared our respondents’ data architecture was going into the pandemic and the role databases have to play in the ability to react and pivot in a crisis.

      • Date: 25 Mar 2021
      View all events
  • Whitepapers
    • LATEST WHITEPAPERS
      Darktrace 120x194
      Cyber AI Response: Threat Report 2019

      This white paper details 7 case studies of attacks that were intercepted and neutralised by Darktrace cyber defense AI, including a zero-day trojan in a manufacturing company's network. Learn how Darktrace Antigena AI Response modules fight back autonomously, no matter where a threat may emerge, extending to the Cloud, Email and SaaS.

      Download
      Darktrace 120x194
      Cyber AI & Darktrace Cloud

      This white paper explores how cloud is a security blind spot for many organisations who struggle with the limited visibility and control in this new environment, where their existing security tools are often not applicable.

      Download
      Find whitepapers
      Search by title or subject area
      View all whitepapers
  • Spotlights
    • Spotlights

      Welcome to Computing's Spotlight section, where we focus in on particularly important themes and topics of enterprise IT.

      Intel logo

       

      Endpoint Management and Security Hub

  • IT Leaders 250
  • Research
  • Delta
  • Tech Marketing Hub
  • About Us
Computing
Computing
  • Home
  • News
  • Big Data & Analytics
  • DevOps
  • Security
  • GDPR
  • AI & ML
  • Women in Tech
  • Cloud & Infrastructure
  • CIO
  • Deskflix
 
    • Newsletters
    • Account details
    • Contact support
    • Sign out
 
 
  • You are currently accessing Computing via your Enterprise account.

    If you already have an account please use the link below to sign in.

    If you have any problems with your access or would like to request an individual access account please contact our customer service team.

    Phone: +44 (0) 1858 438800

    Email: customerservices@incisivemedia.com

    • Sign in
 

China

Chinese 'Cloud Hopper' campaign targeting cloud providers was more extensive than admitted
Chinese 'Cloud Hopper' campaign targeting cloud providers was more extensive than admitted

Cloud Hopper hack enabled the attackers to steal large volumes of intellectual property and other sensitive data

  • Hacking
  • 02 January 2020
Trump administration puts final touches to rules limiting sensitive tech exports to rivals
Trump administration puts final touches to rules limiting sensitive tech exports to rivals

First batch of rules expected to touch involve just a few technologies, such as quantum computing and AI

  • Government
  • 18 December 2019
China orders replacement of all foreign hardware and software
China orders replacement of all foreign hardware and software

Government offices and public institutions will need to replace as many as 30 million devices

  • Government
  • 09 December 2019
Tim Berners-Lee launches 'Contract for the Web' to govern internet giants and governments
Tim Berners-Lee launches 'Contract for the Web' to govern internet giants and governments

Google, Facebook and others sign-up to Berners-Lee's 'global plan of action to make our online world safe and empowering for everyone'

  • Communications
  • 25 November 2019
Hackers linked to China compromised telecoms network to monitor world leaders' messages
Hackers linked to China compromised telecoms network to monitor world leaders' messages

Chinese intelligence targeting 'upstream data entities', such as telecoms companies, in order to compromise world leaders' communications

  • Security
  • 31 October 2019
Microsoft SQL Server 11 and 12 backdoor, accessible with 'magic password', linked to Chinese APT
Microsoft SQL Server 11 and 12 backdoor, accessible with 'magic password', linked to Chinese APT

ESET researchers attribute sophisticated MS SQL Server backdoor tool to China's Winnti Group, also known as APT17

  • Security
  • 21 October 2019
John Sawers: Home-grown technology must be protected from foreign influence
John Sawers: Home-grown technology must be protected from foreign influence

With globalism failing, the ex-head of MI6 warned business leaders against giving up control to overseas investors

  • Mergers and Acquisitions
  • 14 October 2019
Tiny $2 spy chip can be added to IT hardware, claims security researcher Monta Elkins
Tiny $2 spy chip can be added to IT hardware, claims security researcher Monta Elkins

Bloomberg has been widely derided for its Supermicro spy-chip story, but Elkins claims it's feasible and low cost

  • Security
  • 14 October 2019
Compulsory Chinese government propaganda app grants authorities 'superuser' access to smartphones
Compulsory Chinese government propaganda app grants authorities 'superuser' access to smartphones

China's ruling party has made it compulsory for members to download and use the app

  • Privacy
  • 14 October 2019
China to make it compulsory to provide a facial scan when getting new phone numbers or internet access
China to make it compulsory to provide a facial scan when getting new phone numbers or internet access

The new rule will apply from December and will no doubt be used to support the country's draconian 'social credit' system

  • Privacy
  • 11 October 2019
China-linked APT3 group developed NSA-style hacking tools by observing their network traffic
China-linked APT3 group developed NSA-style hacking tools by observing their network traffic

APT3 used NSA-linked exploit tools before 'Shadow Brokers' leaks in 2016 and 2017

  • Security
  • 06 September 2019
China-backed disinformation campaign on social media has been running for years, researchers claim
China-backed disinformation campaign on social media has been running for years, researchers claim

In 2017, thousands of tweets targeted a Chinese businessman who publically accused government officials of corruption

  • Strategy
  • 03 September 2019
Chinese authorities behind two-year old iOS hack - and Android and Windows also compromised
Chinese authorities behind two-year old iOS hack - and Android and Windows also compromised

Apple iOS compromise widespread in Xinjiang also affected Android and Windows PCs - but Google's Project Zero did not disclose these findings

  • Security
  • 02 September 2019
US government receives more than 130 applications for licences to supply Huawei
US government receives more than 130 applications for licences to supply Huawei

US government has yet to issue a single licence after adding Huawei to its Entity List on national security grounds more than three months ago

  • Security
  • 28 August 2019
Trump: US won't do business with Huawei on security grounds - regardless of any trade deal
Trump: US won't do business with Huawei on security grounds - regardless of any trade deal

Some parts of Huawei's business could be exempted from wider US sanctions - but most of the company's business will remain banned

  • Government
  • 19 August 2019
UK goes back to square one on Huawei as Johnson promises to re-examine 5G access
UK goes back to square one on Huawei as Johnson promises to re-examine 5G access

US national security advisor John Bolton claims that the British government is re-thinking its policy on Huawei

  • Security
  • 13 August 2019
China's APT41: State-sponsored espionage by day, hacking for personal gain by night
China's APT41: State-sponsored espionage by day, hacking for personal gain by night

Members of China's APT41 threat group traced back to 2012, attacking video games companies out of hours

  • Hacking
  • 08 August 2019
China threatens India with 'consequences' if it bars Huawei from 5G networks
China threatens India with 'consequences' if it bars Huawei from 5G networks

China wants Indian government to take an independent decision on 5G bidders

  • Communications
  • 07 August 2019
New laws proposed in the US to protect technology supply chains from espionage
New laws proposed in the US to protect technology supply chains from espionage

New law is intended to crack down on alleged espionage by China against US infrastructure and intellectual property

  • Government
  • 01 August 2019
US charges Chinese software engineer for theft of trade secrets
US charges Chinese software engineer for theft of trade secrets

William Yao could face up to ten years in prison if convicted - if he returns from China

  • Government
  • 12 July 2019
Unsecured databases leak 90 million records of people and businesses in China
Unsecured databases leak 90 million records of people and businesses in China

Jiangsu Provincial Public Security Department ElasticSearch database had been made publicly accessible with full admin rights

  • Privacy
  • 09 July 2019
Anti-virus software makers build-in signatures to detect Chinese government malware
Anti-virus software makers build-in signatures to detect Chinese government malware

Avast, Check Point, McAfee, Symantec and Malwarebytes rush to build defences against Chinese government smartphone spyware

  • Security
  • 05 July 2019
Five Chinese supercomputer firms placed on US blacklist, including AMD partner Higon
Five Chinese supercomputer firms placed on US blacklist, including AMD partner Higon

Concern over potential military applications of supercomputers behind the ban, US Government says

  • Legislation and Regulation
  • 25 June 2019
Hackers linked to China breach 10 mobile operators to steal call records
Hackers linked to China breach 10 mobile operators to steal call records

The espionage campaign has been conducted for the past seven years, claim security specialists

  • Security
  • 25 June 2019
123

Most read

'Silver Sparrow' malware infects about 30,000 Macs worldwide
'Silver Sparrow' malware infects about 30,000 Macs worldwide
NHS faces legal challenge over Palantir contract
NHS faces legal challenge over Palantir contract
Google fires AI ethics lead Margaret Mitchell
Google fires AI ethics lead Margaret Mitchell
UK tech jobs surpass pre-pandemic levels, despite rising unemployment
UK tech jobs surpass pre-pandemic levels, despite rising unemployment
Oxford University confirms breach of its Covid-19 lab
Oxford University confirms breach of its Covid-19 lab
  • Contact
  • Delta
  • Marketing solutions
  • Enterprise IT Events
  • Incisive Media
  • Terms & conditions
  • Policies
  • Careers
  • Twitter
  • LinkedIn
  • Newsletters
  • Facebook
  • YouTube

im_logo

© Incisive Business Media (IP) Limited, Published by Incisive Business Media Limited, New London House, 172 Drury Lane, London WC2B 5QR, registered in England and Wales with company registration numbers 09177174 & 09178013

Digital publisher of the year
Digital publisher of the year 2010, 2013, 2016 & 2017
Loading