• Home
  • News
  • Big Data & Analytics
  • DevOps
  • Security
  • GDPR
  • AI & ML
  • Women in Tech
  • Cloud & Infrastructure
  • CIO
  • Deskflix
  • Events
  • Whitepapers
  • Spotlights
  • IT Leaders 250
  • Research
  • Delta
  • Tech Marketing Hub
  • About Us
  • Newsletters
  • Sign in
  •  
      • Newsletters
      • Account details
      • Contact support
      • Sign out
     
     
    • You are currently accessing Computing via your Enterprise account.

      If you already have an account please use the link below to sign in.

      If you have any problems with your access or would like to request an individual access account please contact our customer service team.

      Phone: +44 (0) 1858 438800

      Email: customerservices@incisivemedia.com

      • Sign in
     
  • Follow us
    • Twitter
    • LinkedIn
    • Newsletters
    • Facebook
    • YouTube
  • Register
  • Events
    • Upcoming events
      event logo
      The Pesky Password Problem: What place do passwords have in the modern workplace?

      In this webinar you'll learn: Why passwords are so easy to hack, and how the bad guys do it. How to craft a secure, risk-focused password security policy. The truth about password managers and multi-factor authentication and how they impact our risk. How to empower your end users to become your best last line of defence

      • Date: 21 Jan 2021
      event logo
      Where the buck stops: Why a shared responsibility model will help you own your cloud security flaws

      This webinar, and accompanying dedicated research, will reveal to what extent organisations are practicing a shared responsibility model for cloud security today and the degree to which IT leaders are aware of what they should be doing to ensure the secure use of their multi- and hybrid-cloud environments.

      • Date: 27 Jan 2021
      event logo
      Leveraging the Cloud to Defeat Data Disasters

      Join us and learn how your IT team can realize many of the powerful advantages of the cloud and solve the operational complexity behind managing data across hybrid and multi-cloud IT environments with centralized management, automation, end-to-end security, and lower TCO.

      • Date: 28 Jan 2021
      event logo
      Deskflix Hybrid and Multi Cloud

      One of the most powerful tools for breaking down silos and integrating resources is cloud computing. But multi-tenancy cloud is not the ideal environment for every application or every class of data and some will need to remain on-prem for the foreseeable future; nor are all clouds equal. Tune in to Deskflix season 1 to hear industry experts speak on the questions you need answered on hybrid and multi cloud.

      • Date: 10 Feb 2021
      View all events
  • Whitepapers
    • LATEST WHITEPAPERS
      Darktrace 120x194
      Cyber AI Response: Threat Report 2019

      This white paper details 7 case studies of attacks that were intercepted and neutralised by Darktrace cyber defense AI, including a zero-day trojan in a manufacturing company's network. Learn how Darktrace Antigena AI Response modules fight back autonomously, no matter where a threat may emerge, extending to the Cloud, Email and SaaS.

      Download
      Darktrace 120x194
      Cyber AI & Darktrace Cloud

      This white paper explores how cloud is a security blind spot for many organisations who struggle with the limited visibility and control in this new environment, where their existing security tools are often not applicable.

      Download
      Find whitepapers
      Search by title or subject area
      View all whitepapers
  • Spotlights
    • Spotlights

      Welcome to Computing's Spotlight section, where we focus in on particularly important themes and topics of enterprise IT.

      Intel logo

       

      Endpoint Management and Security Hub

  • IT Leaders 250
  • Research
  • Delta
  • Tech Marketing Hub
  • About Us
Computing
Computing
  • Home
  • News
  • Big Data & Analytics
  • DevOps
  • Security
  • GDPR
  • AI & ML
  • Women in Tech
  • Cloud & Infrastructure
  • CIO
  • Deskflix
 
    • Newsletters
    • Account details
    • Contact support
    • Sign out
 
 
  • You are currently accessing Computing via your Enterprise account.

    If you already have an account please use the link below to sign in.

    If you have any problems with your access or would like to request an individual access account please contact our customer service team.

    Phone: +44 (0) 1858 438800

    Email: customerservices@incisivemedia.com

    • Sign in
 

WikiLeaks

CIA's specialised hacking unit failed to protect its own systems from hackers, investigation finds
CIA's specialised hacking unit failed to protect its own systems from hackers, investigation finds

CIA discovered the breach only after classified information was published by WikiLeaks

  • Security
  • 17 June 2020
CIA was behind 11-year cyber campaign against China, claims Qihoo 360
CIA was behind 11-year cyber campaign against China, claims Qihoo 360

China’s Qihoo-360 names former CIA intelligence officer it claims was behind China cyber attacks, linking him to Vault 7 trove of attack tools

  • Security
  • 03 March 2020
Julian Assange arrested under US extradition warrant following expulsion from Embassy of Ecuador in London
Julian Assange arrested under US extradition warrant following expulsion from Embassy of Ecuador in London

Home Office: "Julian Assange was arrested in relation to a provisional extradition request from the United States of America."

  • Security
  • 11 April 2019
Wikileaks 'Vault 7' leak suspect named - but charged with harbouring images of child abuse
Wikileaks 'Vault 7' leak suspect named - but charged with harbouring images of child abuse

Former CIA and NSA staffer Joshua Schulte cited as suspect in Vault 7 leak of US secret services' hacking tools to Wikileaks

  • Cloud and Infrastructure
  • 16 May 2018
DNC hacker Guccifer 2.0 makes VPN mistake revealing they're a 'member of Russian military intelligence'
DNC hacker Guccifer 2.0 makes VPN mistake revealing they're a 'member of Russian military intelligence'

Hacker mistakenly left a Moscow IP address in server logs of US social media company

  • Hacking
  • 23 March 2018
WikiLeaks attacked by OurMine: what are the lessons?
WikiLeaks attacked by OurMine: what are the lessons?

The apparent defacement of WikiLeaks' website this morning reveals how rudimentary attacks can still have embarrassing impacts.

  • Hacking
  • 31 August 2017
Wikileaks Vault 7: CIA backdoored software updates to spy on allies
Wikileaks Vault 7: CIA backdoored software updates to spy on allies

Another embarrassment for US intelligence dished up by Wikileaks

  • Communications
  • 25 August 2017
WikiLeaks unveils CIA tool for capturing video from IoT cameras
WikiLeaks unveils CIA tool for capturing video from IoT cameras

Even more US government documents are leaked online

  • Government
  • 11 August 2017
WikiLeaks reveals Dumbo: CIA tools for weaponising webcams and corrupting video recordings
WikiLeaks reveals Dumbo: CIA tools for weaponising webcams and corrupting video recordings

More embarrassment for US law enforcement and security services as information about another hacking tool is leaked online

  • Security
  • 04 August 2017
Apple Macs and Linux the target of three CIA hacking tools released from Wikileaks' Vault 7 cache
Apple Macs and Linux the target of three CIA hacking tools released from Wikileaks' Vault 7 cache

Think you're safe because you use Macs or Linux? Think again...

  • Security
  • 28 July 2017

Wikileaks reveals details of CIA's 'Brutal Kangaroo' toolkit for attacking air-gapped networks

Wikileaks reveals details of CIA's 'Brutal Kangaroo' toolkit for attacking air-gapped networks

Brutal Kangaroo is a CIA tool suite for Microsoft Windows that targets closed networks by air gap jumping using thumb drives

  • Security
  • 23 June 2017
The new crime model: why criminals are now holding our data for ransom rather than stealing or selling it
The new crime model: why criminals are now holding our data for ransom rather than stealing or selling it

Ransomware has changed the economic model of cybercrime, argues Paul Farrington

  • Security
  • 31 May 2017
WikiLeaks reveals Archimedes, a CIA tool that can attack a computer inside an LAN
WikiLeaks reveals Archimedes, a CIA tool that can attack a computer inside an LAN

More details on CIA-connected hacking tools released

  • Privacy
  • 08 May 2017
Symantec claims evidence that Wikileaks' Vault 7 tools were used in cyber-espionage campaign in 16 countries
Symantec claims evidence that Wikileaks' Vault 7 tools were used in cyber-espionage campaign in 16 countries

'Longhorn' group used hacking tools detailed by Wikileaks' Vault 7 releases to attack targets in Middle East, Europe and Africa

  • Security
  • 11 April 2017
Shadow Brokers return with new release of NSA hacking tools - and an open letter to President Trump
Shadow Brokers return with new release of NSA hacking tools - and an open letter to President Trump

Russia-linked hacking group denies links to Russia

  • Security
  • 10 April 2017
Assange to learn this week whether he faces likely eviction from Ecuadorian embassy following presidential vote
Assange to learn this week whether he faces likely eviction from Ecuadorian embassy following presidential vote

Challenger in Ecuadorian presidential election has vowed to evict Assange from London embassy

  • Strategy
  • 03 April 2017
Wikileaks' latest Vault 7 document dump reveals CIA infection of 'factory fresh' iPhones and Mac firmware
Wikileaks' latest Vault 7 document dump reveals CIA infection of 'factory fresh' iPhones and Mac firmware

Documents reveal that the CIA has been infecting iPhones since 2008

  • Security
  • 24 March 2017
Wikileaks offers access to CIA hacking document trove to Microsoft, Apple and Google
Wikileaks offers access to CIA hacking document trove to Microsoft, Apple and Google

Julian Assange offers to work with tech giants to help them patch exploited software before Wikileaks publishes more leaked CIA documents

  • Software
  • 10 March 2017
Vault 7: Wikileaks reveals details of CIA's hacks of Android, iPhone Windows, Linux, MacOS, and even Samsung TVs
Vault 7: Wikileaks reveals details of CIA's hacks of Android, iPhone Windows, Linux, MacOS, and even Samsung TVs

You name it, the CIA seems to have hacked it - and left their backdoors behind for others to use

  • Security
  • 07 March 2017
Murky trade in zero-day malware uncovered as leaks show Hacking Team bought MS Office exploit from security firm Netragard
Murky trade in zero-day malware uncovered as leaks show Hacking Team bought MS Office exploit from security firm Netragard

$50k and up is the asking price for exploits, leaked emails reveal

  • Hacking
  • 10 July 2015
Sony Pictures' hacked emails published on Wikileaks
Sony Pictures' hacked emails published on Wikileaks

Film company faces further embarrassment as Wikileaks puts stolen emails online in searchable archive

  • Security
  • 17 April 2015
Global governments negotiating 'mega trade deal' to threaten internet freedoms and international privacy, alleges 'leaked' report
Global governments negotiating 'mega trade deal' to threaten internet freedoms and international privacy, alleges 'leaked' report

Cross-border information exchange and ISP management are focus

  • Internet
  • 19 December 2014
Google handed Wikileaks volunteers' Gmail accounts to NSA, targets reveal
Google handed Wikileaks volunteers' Gmail accounts to NSA, targets reveal

'Google has been compelled to hand over all email associated with my GMail account,' says Herbert Snorrason

  • Privacy
  • 24 June 2013
Reddit co-founder Aaron Swartz dies at 26
Reddit co-founder Aaron Swartz dies at 26

Creator of RSS and co-founder of Reddit found hanged in his home

  • Internet
  • 13 January 2013
12

Most read

Parler data breach: Hackers claim they downloaded everything from Parler before it was taken offline
Parler data breach: Hackers claim they downloaded everything from Parler before it was taken offline
Software errors wipes 'thousands' of arrest records from police databases
Software errors wipes 'thousands' of arrest records from police databases
Delta: Microsoft's identity management lead is under threat
Delta: Microsoft's identity management lead is under threat
BT faces possible £500m claim for overcharging landline-only customers
BT faces possible £500m claim for overcharging landline-only customers
Twitter CEO defends Trump ban while Telegram purges far-right channels
Twitter CEO defends Trump ban while Telegram purges far-right channels
  • Contact
  • Delta
  • Marketing solutions
  • Enterprise IT Events
  • Incisive Media
  • Terms & conditions
  • Policies
  • Careers
  • Twitter
  • LinkedIn
  • Newsletters
  • Facebook
  • YouTube

im_logo

© Incisive Business Media (IP) Limited, Published by Incisive Business Media Limited, New London House, 172 Drury Lane, London WC2B 5QR, registered in England and Wales with company registration numbers 09177174 & 09178013

Digital publisher of the year
Digital publisher of the year 2010, 2013, 2016 & 2017
Loading