• Home
  • News
  • Big Data & Analytics
  • DevOps
  • Security
  • GDPR
  • AI & ML
  • Women in Tech
  • Cloud & Infrastructure
  • CIO
  • Deskflix
  • Events
  • Whitepapers
  • Spotlights
  • IT Leaders 250
  • Research
  • Delta
  • Tech Marketing Hub
  • About Us
  • Newsletters
  • Sign in
  •  
      • Newsletters
      • Account details
      • Contact support
      • Sign out
     
     
    • You are currently accessing Computing via your Enterprise account.

      If you already have an account please use the link below to sign in.

      If you have any problems with your access or would like to request an individual access account please contact our customer service team.

      Phone: +44 (0) 1858 438800

      Email: customerservices@incisivemedia.com

      • Sign in
     
  • Follow us
    • Twitter
    • LinkedIn
    • Newsletters
    • Facebook
    • YouTube
  • Register
  • Events
    • Upcoming events
      event logo
      Where the buck stops: Why a shared responsibility model will help you own your cloud security flaws

      This webinar, and accompanying dedicated research, will reveal to what extent organisations are practicing a shared responsibility model for cloud security today and the degree to which IT leaders are aware of what they should be doing to ensure the secure use of their multi- and hybrid-cloud environments.

      • Date: 27 Jan 2021
      event logo
      Leveraging the Cloud to Defeat Data Disasters

      Join us and learn how your IT team can realize many of the powerful advantages of the cloud and solve the operational complexity behind managing data across hybrid and multi-cloud IT environments with centralized management, automation, end-to-end security, and lower TCO.

      • Date: 28 Jan 2021
      event logo
      Deskflix Hybrid and Multi Cloud

      One of the most powerful tools for breaking down silos and integrating resources is cloud computing. But multi-tenancy cloud is not the ideal environment for every application or every class of data and some will need to remain on-prem for the foreseeable future; nor are all clouds equal. Tune in to Deskflix season 1 to hear industry experts speak on the questions you need answered on hybrid and multi cloud.

      • Date: 10 Feb 2021
      event logo
      Deskflix Financial Services

      oin us for this episode of Deskflix to hear from industry experts and peers on their 2020 best practices, what they’ve learnt for 2021 and how they plan to overcome the next wave of disruption.

      • Date: 03 Mar 2021
      View all events
  • Whitepapers
    • LATEST WHITEPAPERS
      Darktrace 120x194
      Cyber AI Response: Threat Report 2019

      This white paper details 7 case studies of attacks that were intercepted and neutralised by Darktrace cyber defense AI, including a zero-day trojan in a manufacturing company's network. Learn how Darktrace Antigena AI Response modules fight back autonomously, no matter where a threat may emerge, extending to the Cloud, Email and SaaS.

      Download
      Darktrace 120x194
      Cyber AI & Darktrace Cloud

      This white paper explores how cloud is a security blind spot for many organisations who struggle with the limited visibility and control in this new environment, where their existing security tools are often not applicable.

      Download
      Find whitepapers
      Search by title or subject area
      View all whitepapers
  • Spotlights
    • Spotlights

      Welcome to Computing's Spotlight section, where we focus in on particularly important themes and topics of enterprise IT.

      Intel logo

       

      Endpoint Management and Security Hub

  • IT Leaders 250
  • Research
  • Delta
  • Tech Marketing Hub
  • About Us
Computing
Computing
  • Home
  • News
  • Big Data & Analytics
  • DevOps
  • Security
  • GDPR
  • AI & ML
  • Women in Tech
  • Cloud & Infrastructure
  • CIO
  • Deskflix
 
    • Newsletters
    • Account details
    • Contact support
    • Sign out
 
 
  • You are currently accessing Computing via your Enterprise account.

    If you already have an account please use the link below to sign in.

    If you have any problems with your access or would like to request an individual access account please contact our customer service team.

    Phone: +44 (0) 1858 438800

    Email: customerservices@incisivemedia.com

    • Sign in
 

Stuxnet

Ex-MI6 head: Technology is now as important to the world as politics
Ex-MI6 head: Technology is now as important to the world as politics

Sir John Sawers warned that China is rising as a new global superpower, and the West is not in a position to address it

  • Government
  • 14 October 2019
Iran accuses Israel of launching cyber attacks targeting telecoms infrastructure
Iran accuses Israel of launching cyber attacks targeting telecoms infrastructure

Allegations ratchet-up as the US imposes sanctions on Iran

  • Security
  • 06 November 2018
Is Industroyer the biggest security threat to critical infrastructure since Stuxnet?
Is Industroyer the biggest security threat to critical infrastructure since Stuxnet?

Industroyer malware trialed in attack on Ukrainian power grid in 2016

  • Security
  • 13 June 2017
Cyber espionage campaign against Ukraine used PC microphones to eavesdrop on sensitive discussions
Cyber espionage campaign against Ukraine used PC microphones to eavesdrop on sensitive discussions

Seventy government, infrastructure and scientific research establishments all compromised

  • Security
  • 21 February 2017
Kaspersky's Duqu 2.0 malware infiltration aided by stolen Foxconn digital certificates
Kaspersky's Duqu 2.0 malware infiltration aided by stolen Foxconn digital certificates

Digital certificate signed in February used in Kaspersky malware to sniff network traffic

  • Security
  • 16 June 2015
Microsoft finally patches Stuxnet - and the Freak encryption vulnerability
Microsoft finally patches Stuxnet - and the Freak encryption vulnerability

Microsoft fixes long-standing flaw in Windows that enabled Stuxnet worm in its latest Patch Tuesday - but problems emerge with new security patch

  • Security
  • 11 March 2015
In computer security, it's almost impossible to tell the 'good guys' from the 'bad guys'
In computer security, it's almost impossible to tell the 'good guys' from the 'bad guys'

Even the most sophisticated of cyber attacks invariably start with a banal email and a simple attachment or URL. But how should organisations start to protect themselves against such attacks?

  • Security
  • 25 November 2014
Stuxnet-style malware 'developed by Western intelligence agency' uncovered in Russia and Saudi Arabia
Stuxnet-style malware 'developed by Western intelligence agency' uncovered in Russia and Saudi Arabia

Symantec warns that many components of Regin probably 'remain undiscovered' and that 'additional functionality and versions may exist'

  • Security
  • 24 November 2014
State-sponsored agents likely to be behind sophisticated 'Mask' malware - Kaspersky
State-sponsored agents likely to be behind sophisticated 'Mask' malware - Kaspersky

Kaspersky uncovered cyber espionage tool which targeted governments for seven years

  • Hacking
  • 11 February 2014
Computing research: Industrial control systems under attack
Computing research: Industrial control systems under attack

The systems controlling our nuclear facilities could be 20 years old and unpatched. What could possibly go wrong? John Leonard and Danny Palmer investigate

  • Threats and Risks
  • 06 March 2013
Analysis: The era of geopolitical cyber wars
Analysis: The era of geopolitical cyber wars

The 'scramble for Africa' indirectly led to the First World War. Will the 'scramble for the internet' provoke the Third World War?

  • Threats and Risks
  • 18 February 2013
2013 will see more Stuxnet and Flame-like malware attacks, says AVG CTO
2013 will see more Stuxnet and Flame-like malware attacks, says AVG CTO

But hacktivists are more bark than bite says Ben-Itzhak

  • Hacking
  • 06 February 2013
Financial malware 'related to Stuxnet' uncovered by Kaspersky Labs
Financial malware 'related to Stuxnet' uncovered by Kaspersky Labs

Stealth-spread Trojan launched in September targets Lebanese banks - and PayPal

  • Security
  • 09 August 2012
Discovering an old Flame

  • Threats and Risks
  • 26 June 2012
Hypocritical worms

  • Threats and Risks
  • 26 June 2012
Flame virus could delete files, as well as copy them
Flame virus could delete files, as well as copy them

'Espionage' virus starts to reveal its secrets

  • Hacking
  • 22 June 2012
Top 10 articles: Samsung Galaxy S3 review and LinkedIn password breach

Some of the highlights greeting V3 visitors last week

  • Mobile Phones
  • 11 June 2012
Row breaks out in US over Stuxnet worm leaks
Row breaks out in US over Stuxnet worm leaks

Republicans accuse White House of using malware leaks to bolster President's image

  • Threats and Risks
  • 06 June 2012
Flame virus: son of Stuxnet uncovered in Middle East
Flame virus: son of Stuxnet uncovered in Middle East

Complex malware 'developed by a government agency' said to be undetectable by anti-virus and anti-malware programmes

  • Threats and Risks
  • 29 May 2012
US government warns of potential new Stuxnet attack
US government warns of potential new Stuxnet attack

Department of Homeland Security wonders if publishing its analysis on Stuxnet was so smart after all...

  • Threats and Risks
  • 01 August 2011
What are power companies doing to protect their networks from cyber attacks?
What are power companies doing to protect their networks from cyber attacks?

Last year's Stuxnet attack on an Iranian nuclear power facility has alerted electricity suppliers to the security vulnerabilities in their networks

  • Security Technology
  • 06 July 2011
US admits to developing cyber weapons
US admits to developing cyber weapons

Pentagon has arsenal of digital nasties for launching Stuxnet-style attacks

  • Security Technology
  • 03 June 2011
Security failings at Siemens could lead to an attack worse than Stuxnet
Security failings at Siemens could lead to an attack worse than Stuxnet

Company is stuck in the past over vulnerabilities, experts warn

  • Security
  • 25 May 2011
Industrial hacking class cancelled amid security fears
Industrial hacking class cancelled amid security fears

Security researchers pull plug on presentation amid fears its contents were too dangerous to be shared

  • Hacking
  • 20 May 2011
12

Most read

New SolarWinds hack victims emerging every day, as Malwarebytes goes public on breach
New SolarWinds hack victims emerging every day, as Malwarebytes goes public on breach
Women in IT: don't get stuck in 'glue work' if you want to get on
Women in IT: don't get stuck in 'glue work' if you want to get on
Russian malware found on government-issued laptops for home schooling
Russian malware found on government-issued laptops for home schooling
Google locks out another top AI ethicist
Google locks out another top AI ethicist
BT faces possible £500m claim for overcharging landline-only customers
BT faces possible £500m claim for overcharging landline-only customers
  • Contact
  • Delta
  • Marketing solutions
  • Enterprise IT Events
  • Incisive Media
  • Terms & conditions
  • Policies
  • Careers
  • Twitter
  • LinkedIn
  • Newsletters
  • Facebook
  • YouTube

im_logo

© Incisive Business Media (IP) Limited, Published by Incisive Business Media Limited, New London House, 172 Drury Lane, London WC2B 5QR, registered in England and Wales with company registration numbers 09177174 & 09178013

Digital publisher of the year
Digital publisher of the year 2010, 2013, 2016 & 2017
Loading