• Home
  • News
  • Big Data & Analytics
  • DevOps
  • Security
  • GDPR
  • AI & ML
  • Women in Tech
  • Cloud & Infrastructure
  • CIO
  • Deskflix
  • Events
  • Whitepapers
  • Spotlights
  • IT Leaders 250
  • Research
  • Delta
  • Tech Marketing Hub
  • About Us
  • Newsletters
  • Sign in
  •  
      • Newsletters
      • Account details
      • Contact support
      • Sign out
     
     
    • You are currently accessing Computing via your Enterprise account.

      If you already have an account please use the link below to sign in.

      If you have any problems with your access or would like to request an individual access account please contact our customer service team.

      Phone: +44 (0) 1858 438800

      Email: customerservices@incisivemedia.com

      • Sign in
     
  • Follow us
    • Twitter
    • LinkedIn
    • Newsletters
    • Facebook
    • YouTube
  • Register
  • Events
    • Upcoming events
      event logo
      Where the buck stops: Why a shared responsibility model will help you own your cloud security flaws

      This webinar, and accompanying dedicated research, will reveal to what extent organisations are practicing a shared responsibility model for cloud security today and the degree to which IT leaders are aware of what they should be doing to ensure the secure use of their multi- and hybrid-cloud environments.

      • Date: 27 Jan 2021
      event logo
      Leveraging the Cloud to Defeat Data Disasters

      Join us and learn how your IT team can realize many of the powerful advantages of the cloud and solve the operational complexity behind managing data across hybrid and multi-cloud IT environments with centralized management, automation, end-to-end security, and lower TCO.

      • Date: 28 Jan 2021
      event logo
      Deskflix Hybrid and Multi Cloud

      One of the most powerful tools for breaking down silos and integrating resources is cloud computing. But multi-tenancy cloud is not the ideal environment for every application or every class of data and some will need to remain on-prem for the foreseeable future; nor are all clouds equal. Tune in to Deskflix season 1 to hear industry experts speak on the questions you need answered on hybrid and multi cloud.

      • Date: 10 Feb 2021
      event logo
      Deskflix Financial Services

      oin us for this episode of Deskflix to hear from industry experts and peers on their 2020 best practices, what they’ve learnt for 2021 and how they plan to overcome the next wave of disruption.

      • Date: 03 Mar 2021
      View all events
  • Whitepapers
    • LATEST WHITEPAPERS
      Darktrace 120x194
      Cyber AI Response: Threat Report 2019

      This white paper details 7 case studies of attacks that were intercepted and neutralised by Darktrace cyber defense AI, including a zero-day trojan in a manufacturing company's network. Learn how Darktrace Antigena AI Response modules fight back autonomously, no matter where a threat may emerge, extending to the Cloud, Email and SaaS.

      Download
      Darktrace 120x194
      Cyber AI & Darktrace Cloud

      This white paper explores how cloud is a security blind spot for many organisations who struggle with the limited visibility and control in this new environment, where their existing security tools are often not applicable.

      Download
      Find whitepapers
      Search by title or subject area
      View all whitepapers
  • Spotlights
    • Spotlights

      Welcome to Computing's Spotlight section, where we focus in on particularly important themes and topics of enterprise IT.

      Intel logo

       

      Endpoint Management and Security Hub

  • IT Leaders 250
  • Research
  • Delta
  • Tech Marketing Hub
  • About Us
Computing
Computing
  • Home
  • News
  • Big Data & Analytics
  • DevOps
  • Security
  • GDPR
  • AI & ML
  • Women in Tech
  • Cloud & Infrastructure
  • CIO
  • Deskflix
 
    • Newsletters
    • Account details
    • Contact support
    • Sign out
 
 
  • You are currently accessing Computing via your Enterprise account.

    If you already have an account please use the link below to sign in.

    If you have any problems with your access or would like to request an individual access account please contact our customer service team.

    Phone: +44 (0) 1858 438800

    Email: customerservices@incisivemedia.com

    • Sign in
 

Security

Top four technology trends for 2021
Top four technology trends for 2021

Computing gazes into its crystal ball and outlines what it expects to be the big ticket items on IT leaders' agendas in 2021, including remote working, cyber security challenges, enterprise open source and automation

  • Leadership
  • 09 December 2020
Do we need tougher breach notification rules?
Do we need tougher breach notification rules?

The Travelex ransomware raises the question, once again, of whether organisations should be obliged to provide more information

  • Security
  • 14 May 2020
Russian authorities arrest 25 for running stolen credit card marketplace
Russian authorities arrest 25 for running stolen credit card marketplace

Websites trading in stolen debit and credit cards, as well as personal information, have gone dark following raids last week by the FSB

  • Security
  • 30 March 2020
ICO approves use of British mobile phone tracking data to fight spread of coronavirus
ICO approves use of British mobile phone tracking data to fight spread of coronavirus

Regulator okays the use of anonymised phone tracking data to help tackle the spread of COVID-19

  • Privacy
  • 30 March 2020
Flaws in Diameter signalling protocol make all 4G networks prone to denial-of-service attacks
Flaws in Diameter signalling protocol make all 4G networks prone to denial-of-service attacks

The protocol is used to authenticate message and information distribution in 4G networks

  • Threats and Risks
  • 27 March 2020
South Korean APT uses five zero-day flaws to turn the tables on North Korea
South Korean APT uses five zero-day flaws to turn the tables on North Korea

The group, linked to South Korea, used bugs in Internet Explorer, Google Chrome and the Windows Kernel to target North Koreans

  • Hacking
  • 27 March 2020
Cyber security experts collaborate to block coronavirus-related cyber campaigns
Cyber security experts collaborate to block coronavirus-related cyber campaigns

The new group includes professionals from technology firms like Amazon and Microsoft

  • Hacking
  • 26 March 2020
Tupperware accused of ignoring warnings over ecommerce website compromised by web-skimming JavaScript
Tupperware accused of ignoring warnings over ecommerce website compromised by web-skimming JavaScript

Tupperware finally gets round to cleaning its ecommerce site days after being told that it had been compromised by a credit-card-stealing Magecart group

  • Hacking
  • 26 March 2020
Half of all UK businesses hit by security breaches in the past 12 months, according to government Cyber Security Breaches Survey 2020
Half of all UK businesses hit by security breaches in the past 12 months, according to government Cyber Security Breaches Survey 2020

More businesses and charities than ever are being hit by cyber attacks, according to the latest survey – but organisation are also becoming more resilient

  • Security
  • 25 March 2020
Surge in attacks from China-linked APT41 targeting unpatched Citrix servers and Cisco routers
Surge in attacks from China-linked APT41 targeting unpatched Citrix servers and Cisco routers

APT41 attacks carried out between January and March targeted unsecured Citrix NetScaler servers and Cisco routers

  • Security
  • 25 March 2020
More ransomware groups threaten to publish data stolen data from non-payers
More ransomware groups threaten to publish data stolen data from non-payers

More and more ransomware groups are starting to steal data before encryption in order to blackmail their victims into paying up

  • Security
  • 25 March 2020
Easy availability of ICS hacking tools poses major threat to industrial sector, researchers warn
Easy availability of ICS hacking tools poses major threat to industrial sector, researchers warn

Most tools are 'vendor agnostic' and can target products from some of the largest ICS original equipment manufacturers, warns FireEye

  • Threats and Risks
  • 24 March 2020
Spanish hospitals targeted with coronavirus-themed phishing lures in Netwalker ransomware attacks
Spanish hospitals targeted with coronavirus-themed phishing lures in Netwalker ransomware attacks

Groups behind Netwalker switched phishing baits to coronavirus last week - as other ransomware groups pledged to avoid medical facilities

  • Security
  • 24 March 2020
Hackers tried to breach WHO systems amid coronavirus crisis
Hackers tried to breach WHO systems amid coronavirus crisis

The attempt, however, was unsuccessful

  • Hacking
  • 24 March 2020
Microsoft: Two zero-day vulnerabilities in Windows Adobe Type Manager Library are actively being exploited
Microsoft: Two zero-day vulnerabilities in Windows Adobe Type Manager Library are actively being exploited

All supported versions of Windows operating system are affected

  • Threats and Risks
  • 24 March 2020
Cisco fixes five vulnerabilities affecting SD-WAN solutions
Cisco fixes five vulnerabilities affecting SD-WAN solutions

These vulnerabilities impact Cisco products using SD-WAN software earlier than Release 19.2.2

  • Threats and Risks
  • 20 March 2020
Hackers start selling and distributing Sodinokibi data leaks on hacking forums
Hackers start selling and distributing Sodinokibi data leaks on hacking forums

The data allegedly belongs to consultancy Brooks International, which refused to pay ransom to cyber criminals

  • Privacy
  • 20 March 2020
Russia-linked APT28 is using stolen corporate email accounts to facilitate phishing attacks
Russia-linked APT28 is using stolen corporate email accounts to facilitate phishing attacks

Almost 40 per cent of the attacks launched by the group, also known as Pawn Storm, launched over the past year targeted defence companies

  • Hacking
  • 20 March 2020
New Trickbot campaign using brute force attacks to target telecoms firms uncovered by researchers
New Trickbot campaign using brute force attacks to target telecoms firms uncovered by researchers

Operators are using a new module to target Remote Desktop Protocols

  • Threats and Risks
  • 19 March 2020
Some commercial password managers can be fooled into disclosing user passwords, researchers warn
Some commercial password managers can be fooled into disclosing user passwords, researchers warn

Such password managers use weak criteria to find out whether an app is genuine or not

  • Threats and Risks
  • 19 March 2020
Health secretary Matt Hancock: Coronavirus response work covered by exemptions from GDPR
Health secretary Matt Hancock: Coronavirus response work covered by exemptions from GDPR

'GDPR has a clause excepting work in the overwhelming public interest', says Secretary of State for Health Matt Hancock

  • Big Data and Analytics
  • 18 March 2020
Eighty-five per cent of Microsoft Exchange Servers vulnerable to remote-code execution security flaw patched last month
Eighty-five per cent of Microsoft Exchange Servers vulnerable to remote-code execution security flaw patched last month

Organisations warned to patch protect against CVE-2020-0688 as state-backed APTs start targeting vulnerable Exchange Servers

  • Security
  • 18 March 2020
Old laptop containing classified German military files bought for €90 on eBay
Old laptop containing classified German military files bought for €90 on eBay

The researchers were able to unlock military files simply by entering 'guest' for the username and password

  • Threats and Risks
  • 18 March 2020
Pakistan-linked APT36 accused of using coronavirus to propagate Trojans
Pakistan-linked APT36 accused of using coronavirus to propagate Trojans

Malwarebytes claims Pakistan state-sponsored group is using a fake Indian government advisory to spread remote-access Trojan

  • Security
  • 17 March 2020
123

Most read

Russian malware found on government-issued laptops for home schooling
Russian malware found on government-issued laptops for home schooling
New SolarWinds hack victims emerging every day, as Malwarebytes goes public on breach
New SolarWinds hack victims emerging every day, as Malwarebytes goes public on breach
Hackers publish data stolen from SEPA as the agency refuses to pay ransom
Hackers publish data stolen from SEPA as the agency refuses to pay ransom
Google locks out another top AI ethicist
Google locks out another top AI ethicist
Hacker leaks data of more than 2 million dating site users
Hacker leaks data of more than 2 million dating site users
  • Contact
  • Delta
  • Marketing solutions
  • Enterprise IT Events
  • Incisive Media
  • Terms & conditions
  • Policies
  • Careers
  • Twitter
  • LinkedIn
  • Newsletters
  • Facebook
  • YouTube

im_logo

© Incisive Business Media (IP) Limited, Published by Incisive Business Media Limited, New London House, 172 Drury Lane, London WC2B 5QR, registered in England and Wales with company registration numbers 09177174 & 09178013

Digital publisher of the year
Digital publisher of the year 2010, 2013, 2016 & 2017
Loading