• Home
  • News
  • Big Data & Analytics
  • DevOps
  • Security
  • GDPR
  • AI & ML
  • Women in Tech
  • Cloud & Infrastructure
  • CIO
  • Deskflix
  • Events
  • Whitepapers
  • Spotlights
  • IT Leaders 250
  • Research
  • Delta
  • Tech Marketing Hub
  • About Us
  • Newsletters
  • Sign in
  •  
      • Newsletters
      • Account details
      • Contact support
      • Sign out
     
     
    • You are currently accessing Computing via your Enterprise account.

      If you already have an account please use the link below to sign in.

      If you have any problems with your access or would like to request an individual access account please contact our customer service team.

      Phone: +44 (0) 1858 438800

      Email: customerservices@incisivemedia.com

      • Sign in
     
  • Follow us
    • Twitter
    • LinkedIn
    • Newsletters
    • Facebook
    • YouTube
  • Register
  • Events
    • Upcoming events
      event logo
      Where the buck stops: Why a shared responsibility model will help you own your cloud security flaws

      This webinar, and accompanying dedicated research, will reveal to what extent organisations are practicing a shared responsibility model for cloud security today and the degree to which IT leaders are aware of what they should be doing to ensure the secure use of their multi- and hybrid-cloud environments.

      • Date: 27 Jan 2021
      event logo
      Leveraging the Cloud to Defeat Data Disasters

      Join us and learn how your IT team can realize many of the powerful advantages of the cloud and solve the operational complexity behind managing data across hybrid and multi-cloud IT environments with centralized management, automation, end-to-end security, and lower TCO.

      • Date: 28 Jan 2021
      event logo
      Deskflix Hybrid and Multi Cloud

      One of the most powerful tools for breaking down silos and integrating resources is cloud computing. But multi-tenancy cloud is not the ideal environment for every application or every class of data and some will need to remain on-prem for the foreseeable future; nor are all clouds equal. Tune in to Deskflix season 1 to hear industry experts speak on the questions you need answered on hybrid and multi cloud.

      • Date: 10 Feb 2021
      event logo
      Deskflix Financial Services

      oin us for this episode of Deskflix to hear from industry experts and peers on their 2020 best practices, what they’ve learnt for 2021 and how they plan to overcome the next wave of disruption.

      • Date: 03 Mar 2021
      View all events
  • Whitepapers
    • LATEST WHITEPAPERS
      Darktrace 120x194
      Cyber AI Response: Threat Report 2019

      This white paper details 7 case studies of attacks that were intercepted and neutralised by Darktrace cyber defense AI, including a zero-day trojan in a manufacturing company's network. Learn how Darktrace Antigena AI Response modules fight back autonomously, no matter where a threat may emerge, extending to the Cloud, Email and SaaS.

      Download
      Darktrace 120x194
      Cyber AI & Darktrace Cloud

      This white paper explores how cloud is a security blind spot for many organisations who struggle with the limited visibility and control in this new environment, where their existing security tools are often not applicable.

      Download
      Find whitepapers
      Search by title or subject area
      View all whitepapers
  • Spotlights
    • Spotlights

      Welcome to Computing's Spotlight section, where we focus in on particularly important themes and topics of enterprise IT.

      Intel logo

       

      Endpoint Management and Security Hub

  • IT Leaders 250
  • Research
  • Delta
  • Tech Marketing Hub
  • About Us
Computing
Computing
  • Home
  • News
  • Big Data & Analytics
  • DevOps
  • Security
  • GDPR
  • AI & ML
  • Women in Tech
  • Cloud & Infrastructure
  • CIO
  • Deskflix
 
    • Newsletters
    • Account details
    • Contact support
    • Sign out
 
 
  • You are currently accessing Computing via your Enterprise account.

    If you already have an account please use the link below to sign in.

    If you have any problems with your access or would like to request an individual access account please contact our customer service team.

    Phone: +44 (0) 1858 438800

    Email: customerservices@incisivemedia.com

    • Sign in
 

Spear Phishing

Chinese cyber actors are trying to steal Covid-19 vaccine research, FBI
Chinese cyber actors are trying to steal Covid-19 vaccine research, FBI

Theft of such valuable data could threaten the delivery of secure treatment options, the agency believes

  • Threats and Risks
  • 14 May 2020
Threat group APT32 targets Chinese state agencies in efforts to steal Covid-19-related information
Threat group APT32 targets Chinese state agencies in efforts to steal Covid-19-related information

Spear-phishing attacks started just after the WHO issued its first warning about novel coronavirus

  • Hacking
  • 23 April 2020
Iranian hackers target email accounts of WHO staff with spear-phishing messages amid coronavirus pandemic
Iranian hackers target email accounts of WHO staff with spear-phishing messages amid coronavirus pandemic

The attacks began on 2nd March and are continuing

  • Hacking
  • 03 April 2020
Phishing emails have spiked this year, outgrowing malware
Phishing emails have spiked this year, outgrowing malware

Why try to trick a system when you can just fool the user?

  • Threats and Risks
  • 06 December 2017
DarkHotel attackers return, with major shift in method
DarkHotel attackers return, with major shift in method

Instead of shared WiFi, DarkHotel's new attack pattern delivers its payload through social engineering and a Trojan

  • Cloud and Infrastructure
  • 19 July 2017
Ransomware attacks among the most likely to get through defences, research
Ransomware attacks among the most likely to get through defences, research

Even before WannaCry, organisations were reporting relatively high infiltration rates for ransomware

  • Threats and Risks
  • 25 May 2017
The new Companies House website puts company directors at increased risk of spear phishing
The new Companies House website puts company directors at increased risk of spear phishing

Personal information about company directors is now free to download, so why haven't they been informed?

  • Threats and Risks
  • 08 November 2016
The return of the Microsoft Word macro virus with malicious documents that execute PowerShell scripts
The return of the Microsoft Word macro virus with malicious documents that execute PowerShell scripts

Back to the nineties with spear-phishing attacks using Word macros

  • Security
  • 16 March 2016
'Go back to your training schedule' to educate users and cut down phishing attacks, says Mimecast
'Go back to your training schedule' to educate users and cut down phishing attacks, says Mimecast

Policy and governance tips to be revealed in next Wednesday's web seminar

  • Leadership
  • 11 March 2016
Ransomware becoming a serious problem for UK businesses, survey
Ransomware becoming a serious problem for UK businesses, survey

Ransomware is third only to malware and phishing attacks, according to survey

  • Security
  • 27 January 2016
Hackers cause Ukrainian power cut - a reminder cyber attacks will become more dangerous in 2016
Hackers cause Ukrainian power cut - a reminder cyber attacks will become more dangerous in 2016

Ukrainian power outage 'sparked' by email-borne malware makes Ashley Madison hack seem trivial

  • Security
  • 05 January 2016
Raise cyber security awareness by eschewing routine training and doing the unexpected - Mimecast
Raise cyber security awareness by eschewing routine training and doing the unexpected - Mimecast

Use employees' social media profiles to show them how easy it is to obtain their data, says Orlando Scott-Cowley

  • Security
  • 30 November 2015
The Russians are coming! Recession encourages Russian hackers to 'go west'
The Russians are coming! Recession encourages Russian hackers to 'go west'

Unemployment caused by sanctions and low oil prices means more cyber attacks from highly skilled Russian IT specialists

  • Security
  • 22 October 2015
One in five cyber crime victims feel they were specifically targeted by hackers
One in five cyber crime victims feel they were specifically targeted by hackers

Figures by Get Safe Online suggest people are feeling more vulnerable to cyber crime

  • Threats and Risks
  • 19 October 2015
How being a victim of cyber crime made me an even bigger target for hackers
How being a victim of cyber crime made me an even bigger target for hackers

Computing's Danny Palmer almost found out the hard way how cyber criminals are getting craftier...

  • Hacking
  • 09 October 2015
Russian government behind seven-year cyber-espionage campaign by 'Dukes' hacking group, claims F-Secure
Russian government behind seven-year cyber-espionage campaign by 'Dukes' hacking group, claims F-Secure

F-Secure accuses the Kremlin of being behind well-resourced group that targeted governments worldwide

  • Security
  • 17 September 2015
Hackers can make phishing attempts look like emails from your CEO
Hackers can make phishing attempts look like emails from your CEO

Michael Cock, group IT manager at Sutton and East Surrey Water, tells Computing employees have received phishing attempts in emails which appear to be from company chairman

  • Security
  • 17 August 2015
How ForeScout provides Sutton and East Surrey Water with 'an overarching view of security'
How ForeScout provides Sutton and East Surrey Water with 'an overarching view of security'

Sutton and East Surrey Water group IT manager Michael Cock explains how ForeScout has improved security at the utilities firm

  • Security
  • 17 August 2015
Why was Carphone Warehouse keeping customer passwords in plain text, just months after it was hacked? [UPDATED]
Why was Carphone Warehouse keeping customer passwords in plain text, just months after it was hacked? [UPDATED]

If customer credit cards were encrypted, why weren't current account details? Security specialists respond

  • Security
  • 10 August 2015
Russian hackers breach Pentagon email system
Russian hackers breach Pentagon email system

US Department of Defense email shut down and officials point the finger at Russia

  • Government
  • 07 August 2015
Data security: where are the main threats coming from now?
Data security: where are the main threats coming from now?

Spammers, script kiddies, crypto-malware, spear-phishing... Computing research reveals which threats IT professionals fear most

  • Security
  • 06 August 2015
Kaspersky's Duqu 2.0 malware infiltration aided by stolen Foxconn digital certificates
Kaspersky's Duqu 2.0 malware infiltration aided by stolen Foxconn digital certificates

Digital certificate signed in February used in Kaspersky malware to sniff network traffic

  • Security
  • 16 June 2015

Most read

New SolarWinds hack victims emerging every day, as Malwarebytes goes public on breach
New SolarWinds hack victims emerging every day, as Malwarebytes goes public on breach
Women in IT: don't get stuck in 'glue work' if you want to get on
Women in IT: don't get stuck in 'glue work' if you want to get on
Russian malware found on government-issued laptops for home schooling
Russian malware found on government-issued laptops for home schooling
Google locks out another top AI ethicist
Google locks out another top AI ethicist
BT faces possible £500m claim for overcharging landline-only customers
BT faces possible £500m claim for overcharging landline-only customers
  • Contact
  • Delta
  • Marketing solutions
  • Enterprise IT Events
  • Incisive Media
  • Terms & conditions
  • Policies
  • Careers
  • Twitter
  • LinkedIn
  • Newsletters
  • Facebook
  • YouTube

im_logo

© Incisive Business Media (IP) Limited, Published by Incisive Business Media Limited, New London House, 172 Drury Lane, London WC2B 5QR, registered in England and Wales with company registration numbers 09177174 & 09178013

Digital publisher of the year
Digital publisher of the year 2010, 2013, 2016 & 2017
Loading