• Home
  • News
  • Big Data & Analytics
  • DevOps
  • Security
  • GDPR
  • AI & ML
  • Women in Tech
  • Cloud & Infrastructure
  • CIO
  • Deskflix
  • Events
  • Whitepapers
  • Spotlights
  • IT Leaders 250
  • Research
  • Delta
  • Tech Marketing Hub
  • About Us
  • Newsletters
  • Sign in
  •  
      • Newsletters
      • Account details
      • Contact support
      • Sign out
     
     
    • You are currently accessing Computing via your Enterprise account.

      If you already have an account please use the link below to sign in.

      If you have any problems with your access or would like to request an individual access account please contact our customer service team.

      Phone: +44 (0) 1858 438800

      Email: customerservices@incisivemedia.com

      • Sign in
     
  • Follow us
    • Twitter
    • LinkedIn
    • Newsletters
    • Facebook
    • YouTube
  • Register
  • Events
    • Upcoming events
      event logo
      Where the buck stops: Why a shared responsibility model will help you own your cloud security flaws

      This webinar, and accompanying dedicated research, will reveal to what extent organisations are practicing a shared responsibility model for cloud security today and the degree to which IT leaders are aware of what they should be doing to ensure the secure use of their multi- and hybrid-cloud environments.

      • Date: 27 Jan 2021
      event logo
      Leveraging the Cloud to Defeat Data Disasters

      Join us and learn how your IT team can realize many of the powerful advantages of the cloud and solve the operational complexity behind managing data across hybrid and multi-cloud IT environments with centralized management, automation, end-to-end security, and lower TCO.

      • Date: 28 Jan 2021
      event logo
      Deskflix Hybrid and Multi Cloud

      One of the most powerful tools for breaking down silos and integrating resources is cloud computing. But multi-tenancy cloud is not the ideal environment for every application or every class of data and some will need to remain on-prem for the foreseeable future; nor are all clouds equal. Tune in to Deskflix season 1 to hear industry experts speak on the questions you need answered on hybrid and multi cloud.

      • Date: 10 Feb 2021
      event logo
      Deskflix Financial Services

      oin us for this episode of Deskflix to hear from industry experts and peers on their 2020 best practices, what they’ve learnt for 2021 and how they plan to overcome the next wave of disruption.

      • Date: 03 Mar 2021
      View all events
  • Whitepapers
    • LATEST WHITEPAPERS
      Darktrace 120x194
      Cyber AI Response: Threat Report 2019

      This white paper details 7 case studies of attacks that were intercepted and neutralised by Darktrace cyber defense AI, including a zero-day trojan in a manufacturing company's network. Learn how Darktrace Antigena AI Response modules fight back autonomously, no matter where a threat may emerge, extending to the Cloud, Email and SaaS.

      Download
      Darktrace 120x194
      Cyber AI & Darktrace Cloud

      This white paper explores how cloud is a security blind spot for many organisations who struggle with the limited visibility and control in this new environment, where their existing security tools are often not applicable.

      Download
      Find whitepapers
      Search by title or subject area
      View all whitepapers
  • Spotlights
    • Spotlights

      Welcome to Computing's Spotlight section, where we focus in on particularly important themes and topics of enterprise IT.

      Intel logo

       

      Endpoint Management and Security Hub

  • IT Leaders 250
  • Research
  • Delta
  • Tech Marketing Hub
  • About Us
Computing
Computing
  • Home
  • News
  • Big Data & Analytics
  • DevOps
  • Security
  • GDPR
  • AI & ML
  • Women in Tech
  • Cloud & Infrastructure
  • CIO
  • Deskflix
 
    • Newsletters
    • Account details
    • Contact support
    • Sign out
 
 
  • You are currently accessing Computing via your Enterprise account.

    If you already have an account please use the link below to sign in.

    If you have any problems with your access or would like to request an individual access account please contact our customer service team.

    Phone: +44 (0) 1858 438800

    Email: customerservices@incisivemedia.com

    • Sign in
 

cyber espionage

Cyber espionage campaign helped China acquire intellectual property behind C919 airplane
Cyber espionage campaign helped China acquire intellectual property behind C919 airplane

CrowdStrike claims Chinese authorities largely stole the technology behind China's first passenger airliner, the Comac C919

  • Security
  • 15 October 2019
Ex-MI6 head: Technology is now as important to the world as politics
Ex-MI6 head: Technology is now as important to the world as politics

Sir John Sawers warned that China is rising as a new global superpower, and the West is not in a position to address it

  • Government
  • 14 October 2019
China's APT41: State-sponsored espionage by day, hacking for personal gain by night
China's APT41: State-sponsored espionage by day, hacking for personal gain by night

Members of China's APT41 threat group traced back to 2012, attacking video games companies out of hours

  • Hacking
  • 08 August 2019
Operation Sharpshooter cyber espionage campaign linked with North Korea - McAfee
Operation Sharpshooter cyber espionage campaign linked with North Korea - McAfee

North Korea-linked campaign more extensive in complexity and scope than previously thought

  • Security
  • 07 March 2019
China blamed for hack on EU diplomatic communications
China blamed for hack on EU diplomatic communications

China denies being behind cyber espionage which saw messages intercepted for three years

  • Security
  • 19 December 2018
Russian 'Fancy Bear' hackers accused of exploiting Windows flaw exposed by Google
Russian 'Fancy Bear' hackers accused of exploiting Windows flaw exposed by Google

Microsoft warns users to update ASAP

  • Security
  • 02 November 2016
Schneier is right about the DDoS threat: 'We see the worst-case scenario every year', says Level 3
Schneier is right about the DDoS threat: 'We see the worst-case scenario every year', says Level 3

Tier-one provider uses threat intelligence and advanced routing and filtering to see off attacks

  • Threats and Risks
  • 28 September 2016
Dukes hacking group 'based in Moscow', claims F-Secure
Dukes hacking group 'based in Moscow', claims F-Secure

Even Russia's Kaspersky concurs with F-Secure's conclusion

  • Security
  • 17 September 2015
US to take backdoor approach to introducing backdoors to counter encryption
US to take backdoor approach to introducing backdoors to counter encryption

Administration concedes that legislation to enforce the weakening of security in US products is unlikely to be passed - and adopts a charm offensive instead

  • Security
  • 17 September 2015
Russian government behind seven-year cyber-espionage campaign by 'Dukes' hacking group, claims F-Secure
Russian government behind seven-year cyber-espionage campaign by 'Dukes' hacking group, claims F-Secure

F-Secure accuses the Kremlin of being behind well-resourced group that targeted governments worldwide

  • Security
  • 17 September 2015
The rise of state-sponsored cyber attacks: what companies need to know
The rise of state-sponsored cyber attacks: what companies need to know

Chris Gould, cyber leader at EY in the UK & Ireland, on why state-sponsored attacks are becoming more common, the form they take and what firms can do to protect themselves

  • Security
  • 14 September 2015
China tells US to stop 'groundless accusations' that it's hacking American targets
China tells US to stop 'groundless accusations' that it's hacking American targets

'We hope that the US stops its groundless attacks against China, start dialogue based on a foundation of mutual respect,' says foreign ministry spokesperson

  • Security
  • 11 September 2015
White House plans sanctions against China and Russia for cyber attacks
White House plans sanctions against China and Russia for cyber attacks

US to sanction Russian and Chinese companies suspected of benefiting from cyber espionage against US targets

  • Threats and Risks
  • 01 September 2015
United Nations demands states respect its privacy after AT&T NSA spying revealed
United Nations demands states respect its privacy after AT&T NSA spying revealed

Newly released Snowden docs reveal how "highly collaborative" AT&T helped US spy on UN for 10 years

  • Privacy
  • 18 August 2015
Russian hackers breach Pentagon email system
Russian hackers breach Pentagon email system

US Department of Defense email shut down and officials point the finger at Russia

  • Government
  • 07 August 2015
Hacking Team hackers investigated by Italian police over claims they exposed corporate secrets
Hacking Team hackers investigated by Italian police over claims they exposed corporate secrets

Hacking Team also considered building Wi-Fi network busting drone with Boeing

  • Security
  • 20 July 2015
US intelligence chief points finger at China as 'leading suspect' in OPM hack
US intelligence chief points finger at China as 'leading suspect' in OPM hack

"You have to kind-of salute the Chinese for what they did," says intelligence director James Clapper

  • Government
  • 26 June 2015
'We're all in the blast radius of a cyber arms race,' warns Bruce Schneier
'We're all in the blast radius of a cyber arms race,' warns Bruce Schneier

Security expert warns of increasing cyber warfare, especially as it's difficult to tell if you're being attacked by a government or 'two guys in a basement'

  • Threats and Risks
  • 03 June 2015
Snowden slams UK government attempts to secretly pass legislation allowing GCHQ to 'hack anybody's computer'
Snowden slams UK government attempts to secretly pass legislation allowing GCHQ to 'hack anybody's computer'

'They want to be able to target anybody,' says Snowden during live Q&A with Amnesty International UK

  • Privacy
  • 02 June 2015
'Mafias and governments are attacking our networks,' says investment firm
'Mafias and governments are attacking our networks,' says investment firm

'The bad guys only have to succeed once, security has to succeed 100 per cent of the time,' Miguel Segimon, information security manager tells Computing

  • Security
  • 19 May 2015
Chinese government-backed hackers carried out 10-year cyber espionage campaign, claims FireEye
Chinese government-backed hackers carried out 10-year cyber espionage campaign, claims FireEye

FireEye claims other Asian governments were the target of shift-working, collaborative state-backed hackers employed by China

  • Threats and Risks
  • 13 April 2015
Forbes 'watering hole' attack the work of Chinese state cyber espionage, claim researchers
Forbes 'watering hole' attack the work of Chinese state cyber espionage, claim researchers

US defence contractors and banks targeted following Forbes attack

  • Security
  • 12 February 2015

Most read

Russian malware found on government-issued laptops for home schooling
Russian malware found on government-issued laptops for home schooling
New SolarWinds hack victims emerging every day, as Malwarebytes goes public on breach
New SolarWinds hack victims emerging every day, as Malwarebytes goes public on breach
Google locks out another top AI ethicist
Google locks out another top AI ethicist
Hackers publish data stolen from SEPA as the agency refuses to pay ransom
Hackers publish data stolen from SEPA as the agency refuses to pay ransom
Hacker leaks data of more than 2 million dating site users
Hacker leaks data of more than 2 million dating site users
  • Contact
  • Delta
  • Marketing solutions
  • Enterprise IT Events
  • Incisive Media
  • Terms & conditions
  • Policies
  • Careers
  • Twitter
  • LinkedIn
  • Newsletters
  • Facebook
  • YouTube

im_logo

© Incisive Business Media (IP) Limited, Published by Incisive Business Media Limited, New London House, 172 Drury Lane, London WC2B 5QR, registered in England and Wales with company registration numbers 09177174 & 09178013

Digital publisher of the year
Digital publisher of the year 2010, 2013, 2016 & 2017
Loading