• Home
  • News
  • Big Data & Analytics
  • DevOps
  • Security
  • GDPR
  • AI & ML
  • Women in Tech
  • Cloud & Infrastructure
  • CIO
  • Deskflix
  • Events
  • Whitepapers
  • Spotlights
  • IT Leaders 250
  • Research
  • Delta
  • Tech Marketing Hub
  • About Us
  • Newsletters
  • Sign in
  •  
      • Newsletters
      • Account details
      • Contact support
      • Sign out
     
     
    • You are currently accessing Computing via your Enterprise account.

      If you already have an account please use the link below to sign in.

      If you have any problems with your access or would like to request an individual access account please contact our customer service team.

      Phone: +44 (0) 1858 438800

      Email: customerservices@incisivemedia.com

      • Sign in
     
  • Follow us
    • Twitter
    • LinkedIn
    • Newsletters
    • Facebook
    • YouTube
  • Register
  • Events
    • Upcoming events
      event logo
      Where the buck stops: Why a shared responsibility model will help you own your cloud security flaws

      This webinar, and accompanying dedicated research, will reveal to what extent organisations are practicing a shared responsibility model for cloud security today and the degree to which IT leaders are aware of what they should be doing to ensure the secure use of their multi- and hybrid-cloud environments.

      • Date: 27 Jan 2021
      event logo
      Leveraging the Cloud to Defeat Data Disasters

      Join us and learn how your IT team can realize many of the powerful advantages of the cloud and solve the operational complexity behind managing data across hybrid and multi-cloud IT environments with centralized management, automation, end-to-end security, and lower TCO.

      • Date: 28 Jan 2021
      event logo
      Deskflix Hybrid and Multi Cloud

      One of the most powerful tools for breaking down silos and integrating resources is cloud computing. But multi-tenancy cloud is not the ideal environment for every application or every class of data and some will need to remain on-prem for the foreseeable future; nor are all clouds equal. Tune in to Deskflix season 1 to hear industry experts speak on the questions you need answered on hybrid and multi cloud.

      • Date: 10 Feb 2021
      event logo
      Deskflix Financial Services

      oin us for this episode of Deskflix to hear from industry experts and peers on their 2020 best practices, what they’ve learnt for 2021 and how they plan to overcome the next wave of disruption.

      • Date: 03 Mar 2021
      View all events
  • Whitepapers
    • LATEST WHITEPAPERS
      Darktrace 120x194
      Cyber AI Response: Threat Report 2019

      This white paper details 7 case studies of attacks that were intercepted and neutralised by Darktrace cyber defense AI, including a zero-day trojan in a manufacturing company's network. Learn how Darktrace Antigena AI Response modules fight back autonomously, no matter where a threat may emerge, extending to the Cloud, Email and SaaS.

      Download
      Darktrace 120x194
      Cyber AI & Darktrace Cloud

      This white paper explores how cloud is a security blind spot for many organisations who struggle with the limited visibility and control in this new environment, where their existing security tools are often not applicable.

      Download
      Find whitepapers
      Search by title or subject area
      View all whitepapers
  • Spotlights
    • Spotlights

      Welcome to Computing's Spotlight section, where we focus in on particularly important themes and topics of enterprise IT.

      Intel logo

       

      Endpoint Management and Security Hub

  • IT Leaders 250
  • Research
  • Delta
  • Tech Marketing Hub
  • About Us
Computing
Computing
  • Home
  • News
  • Big Data & Analytics
  • DevOps
  • Security
  • GDPR
  • AI & ML
  • Women in Tech
  • Cloud & Infrastructure
  • CIO
  • Deskflix
 
    • Newsletters
    • Account details
    • Contact support
    • Sign out
 
 
  • You are currently accessing Computing via your Enterprise account.

    If you already have an account please use the link below to sign in.

    If you have any problems with your access or would like to request an individual access account please contact our customer service team.

    Phone: +44 (0) 1858 438800

    Email: customerservices@incisivemedia.com

    • Sign in
 

social engineering

Social engineering attack compromises influential Twitter accounts
Social engineering attack compromises influential Twitter accounts

Attackers paid a Twitter employee to provide access to accounts including those of Bill Gates, Barack Obama and Elon Musk

  • Hacking
  • 16 July 2020
Deskflix Season 3. Cyber security: new threats, new approaches
Deskflix Season 3. Cyber security: new threats, new approaches

Join us for our live virtual event on 18th June

  • Security
  • 09 June 2020
Cyber crooks exploit cardless ATMs using phishing and social engineering
Cyber crooks exploit cardless ATMs using phishing and social engineering

Cardless ATMs exploited by a combination of phishing and adding new numbers to customers' mobile accounts

  • Security
  • 09 November 2018
Morrisons should be a lesson on the costly consequences of insider threats
Morrisons should be a lesson on the costly consequences of insider threats

What can other companies learn from the class-action lawsuit facing Morrisons?

  • Threats and Risks
  • 02 January 2018
Do you publicise your management team? You're helping hackers, says Mimecast
Do you publicise your management team? You're helping hackers, says Mimecast

Showing the world who your management team are, what they look like and what their contact details are helps hackers with social engineering attacks

  • Security
  • 23 November 2017
Necurs back with a vengeance - now gathering victims' data to improve success rates
Necurs back with a vengeance - now gathering victims' data to improve success rates

The new strain takes screengrabs and reports errors back to malware authors

  • Hacking
  • 19 October 2017
Corvid wants to remove the weak link from cyber: the users
Corvid wants to remove the weak link from cyber: the users

It's unrealistic to train users to recognise every threat, especially with modern hackers' levels of sophistication, argues CTO Andrew Nanson

  • Security
  • 25 August 2017
Humans are the weak point in cyber - how do we change that?
Humans are the weak point in cyber - how do we change that?

The changing business environment has created more opportunities for workers to cause a breach - not always unknowingly

  • Security
  • 20 June 2017
Twitter faces lawsuit for eavesdropping on direct messages
Twitter faces lawsuit for eavesdropping on direct messages

If plaintiffs win, every Twitter user in US could receive damages

  • Applications
  • 16 September 2015
Facebook security flaw enables attackers to control users' PCs
Facebook security flaw enables attackers to control users' PCs

Millions of users could be at risk from two vulnerabilities, but Facebook downplays significance

  • Security
  • 12 March 2015
LinkedIn users warned of new phishing scam
LinkedIn users warned of new phishing scam

Fake emails discovered designed to harvest logins and passwords

  • Hacking
  • 18 July 2014
Security industry advice for battling Turing Test-beating AIs: 'Be nice and sceptical'
Security industry advice for battling Turing Test-beating AIs: 'Be nice and sceptical'

Symantec and Juniper admit there is not yet a clear plan for beating more advanced forms of 'Eugene Goostman'

  • Security
  • 11 June 2014
Experian subsidiary sold personal details to fraudster in six-year scam
Experian subsidiary sold personal details to fraudster in six-year scam

US subsidiary of Experian sold 500,000 records to fraudster posing as private investigator

  • Security
  • 31 March 2014
Eight arrested over £1.3m cyber-raid on Barclays bank branch
Eight arrested over £1.3m cyber-raid on Barclays bank branch

Attacker posed as an IT engineer to plant keyboard, video and mouse (KVM) switch with 3G modem in Barclays branch

  • Security
  • 20 September 2013

Most read

Russian malware found on government-issued laptops for home schooling
Russian malware found on government-issued laptops for home schooling
New SolarWinds hack victims emerging every day, as Malwarebytes goes public on breach
New SolarWinds hack victims emerging every day, as Malwarebytes goes public on breach
Hackers publish data stolen from SEPA as the agency refuses to pay ransom
Hackers publish data stolen from SEPA as the agency refuses to pay ransom
Google locks out another top AI ethicist
Google locks out another top AI ethicist
Hacker leaks data of more than 2 million dating site users
Hacker leaks data of more than 2 million dating site users
  • Contact
  • Delta
  • Marketing solutions
  • Enterprise IT Events
  • Incisive Media
  • Terms & conditions
  • Policies
  • Careers
  • Twitter
  • LinkedIn
  • Newsletters
  • Facebook
  • YouTube

im_logo

© Incisive Business Media (IP) Limited, Published by Incisive Business Media Limited, New London House, 172 Drury Lane, London WC2B 5QR, registered in England and Wales with company registration numbers 09177174 & 09178013

Digital publisher of the year
Digital publisher of the year 2010, 2013, 2016 & 2017
Loading