Hackers and cybercrime prevention
-
Opinion
31 Jan 2025
Can security operations ever be fully autonomous?
Focusing on targeted improvements, not full automation, is key to scaling security operations with AI Continue Reading
-
News
27 Jan 2025
Inside CyberArk’s security strategy
CyberArk CIO Omer Grossman talks up the company’s security-first ethos, the importance of an assumed breach mentality and how the company is addressing threats from the growing use of AI Continue Reading
By- Aaron Tan, TechTarget
-
Definition
03 Mar 2025
What is cyberstalking and how to prevent it?
Cyberstalking is a crime in which someone harasses or stalks a victim using electronic or digital means, such as social media, email, instant messaging (IM) or messages posted to a discussion group or forum. Continue Reading
-
News
03 Mar 2025
Singapore’s HomeTeamNS hit by ransomware attack
The non-profit organisation suffered a ransomware attack that affected some servers containing employee and member data, prompting an investigation and enhanced security measures Continue Reading
By- Aaron Tan, TechTarget
-
News
01 Mar 2025
Ransomware: from REvil to Black Basta, what do we know about Tramp?
This key member of the Black Basta ransomware gang is wanted by the US justice system. He narrowly escaped extradition at the end of June 2024 - with the help of highly-placed contacts in Moscow, according to him Continue Reading
By- Valéry Rieß-Marchive, Rédacteur en chef
-
News
28 Feb 2025
France pushes for law enforcement access to Signal, WhatsApp and encrypted email
Proposals to be discussed in the French Parliament will require tech companies to hand over decrypted messages and email or face huge fines Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
28 Feb 2025
NHS staff lack confidence in health service cyber measures
NHS staff understand their role in protecting the health service from cyber threats and the public backs them in this aim, but legacy tech and a lack of training are hindering efforts, according to BT Continue Reading
By- Alex Scroxton, Security Editor
-
Definition
27 Feb 2025
What is domain generation algorithm (DGA)?
A domain generation algorithm (DGA) is a program that generates a large list of domain names. DGAs provide malware with new domains to evade security countermeasures. Continue Reading
By- Nick Barney, Technology Writer
- Alexander S. Gillis, Technical Writer and Editor
- Sharon Shea, Executive Editor
-
News
26 Feb 2025
US intelligence chief Tulsi Gabbard probes UK demand for Apple’s encrypted data
A secret order issued by the UK against Apple would be a ‘clear and egregious violation’ if it provides back door access to Americans’ encrypted data, says US director of national intelligence Continue Reading
By- Bill Goodwin, Computer Weekly
-
Opinion
25 Feb 2025
Reflecting on three years of cyber warfare in Ukraine
With the third anniversary of Russia's illegal invasion of Ukraine passing this week, Charl Van Der Walt reflects on how the cyber threat landscape in Europe has changed since 2022 Continue Reading
By- Charl Van Der Walt, Orange Cyberdefense
-
E-Zine
25 Feb 2025
Rethinking the route to net zero
In this week’s Computer Weekly, our latest buyer’s guide looks at the need to apply innovative and long-term thinking to reducing carbon emissions in IT. We find out how retailer Dunelm is benefiting from a programme to attract, retain and support women in tech. And Volvo Cars explains why the future for its vehicles is software-defined. Read the issue now. Continue Reading
-
News
25 Feb 2025
Ransomware: on the murky trail of one of the leaders of Black Basta
The internal exchanges within the Black Basta group revealed last week offer a new opportunity to investigate one of its leaders: Tramp. He may have been arrested in Armenia in June 2024, before being released Continue Reading
By- Valéry Rieß-Marchive, Rédacteur en chef
-
News
24 Feb 2025
European Union calls for more cyber data-sharing with Nato
Updates to the EU’s Cyber Blueprint, establishing best practice for multilateral security incident response in Europe, include calls for more collaboration with Nato member states, as the geopolitical environment becomes ever more fractious Continue Reading
By- Alex Scroxton, Security Editor
-
News
23 Feb 2025
Check Point co-founder on AI, quantum and independence
Gil Shwed, Check Point’s co-founder and executive chairman, discusses the company’s focus on artificial intelligence-driven security and his commitment to remaining an independent force in the cyber security market Continue Reading
By- Aaron Tan, TechTarget
-
News
21 Feb 2025
A landscape forever altered? The LockBit takedown one year on
The NCA-led takedown of the LockBit ransomware gang in February 2024 heralded a transformative year in the fight against cyber crime. One year on, we look back at Operation Cronos and its impact Continue Reading
By- Alex Scroxton, Security Editor
-
News
20 Feb 2025
Watchdog approves Sellafield physical security, but warns about cyber
The Office for Nuclear Regulation has taken Sellafield out of special measures for physical security, but harbours cyber security concerns Continue Reading
By- Brian McKenna, Enterprise Applications Editor
-
E-Zine
20 Feb 2025
CW APAC – Trend Watch: CIO trends 2025
It will be no surprise to see artificial intelligence high on the agenda for 2025. In this handbook, focused on CIO trends in the Asia-Pacific region, Computer Weekly looks at how banks are navigating technology, the continued importance of cyber security, and how enterprises can cement their AI future. Continue Reading
-
News
19 Feb 2025
Warning over privacy of encrypted messages as Russia targets Signal Messenger
Russia is using phishing attacks to compromise encrypted Signal Messenger services used by targets in the Ukraine. Experts warn that other encrypted app users are at risk Continue Reading
By- Bill Goodwin, Computer Weekly
-
Definition
18 Feb 2025
What are social engineering attacks?
Social engineering is an attack vector that relies heavily on human interaction and often involves psychological manipulation of people into breaking normal security procedures and best practices to gain unauthorized access. Continue Reading
By- Paul Kirvan
- Madelyn Bacon, TechTarget
-
News
18 Feb 2025
MSP cuts costs with Scality pay-as-you-go anti-ransomware storage
Autodata gets Scality as-a-service for on-site immutable storage via Artesca, to allow customers to rapidly recover from ransomware and at the same cost per terabyte no matter the volume Continue Reading
By- Antony Adshead, Storage Editor
-
News
18 Feb 2025
CPX 2025: Check Point CEO talks up hybrid mesh security
At CPX 2025 in Bangkok, Check Point CEO Nadav Zafrir outlined a vision for network security centred on hybrid mesh architecture and AI-powered capabilities Continue Reading
By- Aaron Tan, TechTarget
-
News
17 Feb 2025
The Security Interviews: Yevgeny Dibrov, Armis
Armis CEO Yevgeny Dibrov talks about how his military service and intelligence work opened the door into the world of cyber security entrepreneurship Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
16 Feb 2025
How to get employees to take cyber risk more seriously
To combat risky cyber security behaviour, organisations must move beyond awareness training and cultivate a culture where security violations are personally felt and socially unacceptable, leveraging existing values, real-world impacts, and even humour Continue Reading
By- Leigh McMullen
-
News
14 Feb 2025
Lenovo CSO: AI adoption fuels security paranoia
Doug Fisher, Lenovo’s chief security officer, outlines the company’s approach to security and AI governance, and the importance of having a strong security culture to combat cyber threats amplified by the use of AI Continue Reading
By- Aaron Tan, TechTarget
-
News
14 Feb 2025
Government renames AI Safety Institute and teams up with Anthropic
Addressing the Munich Security Conference, UK government technology secretary Peter Kyle announces a change to the name of the AI Safety Institute and a tie-up with AI company Anthropic Continue Reading
By- Brian McKenna, Enterprise Applications Editor
-
News
14 Feb 2025
Top cryptography experts join calls for UK to drop plans to snoop on Apple’s encrypted data
Some of the world’s leading computer science experts have signed an open letter calling for home secretary Yvette Cooper to drop a controversial secret order to require Apple to provide access to people’s encrypted data Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
13 Feb 2025
UK accused of political ‘foreign cyber attack’ on US after serving secret snooping order on Apple
US administration asked to kick UK out of 65-year-old UK-US Five Eyes intelligence sharing agreement after secret order to access encrypted data of Apple users Continue Reading
By- Duncan Campbell , 2QQ Ltd, Sussex University
-
News
13 Feb 2025
UK government sanctions target Russian cyber crime network Zservers
The UK government has imposed sanctions on a Russian cyber crime syndicate responsible for aiding ransomware attacks, targeting the group and individual members Continue Reading
By- Brian McKenna, Enterprise Applications Editor
-
News
12 Feb 2025
Microsoft’s February 2025 Patch Tuesday corrects 57 bugs, three critical
Microsoft is correcting 57 vulnerabilities in its February Patch Tuesday, two of which are being actively exploited in the wild, and three of which are ‘critical’ Continue Reading
By- Brian McKenna, Enterprise Applications Editor
-
News
11 Feb 2025
Google: Cyber crime meshes with cyber warfare as states enlist gangs
A report from the Google Threat Intelligence Group depicts China, Russia, Iran and North Korea as a bloc using cyber criminal gangs to attack the national security of western countries Continue Reading
By- Brian McKenna, Enterprise Applications Editor
-
News
10 Feb 2025
Apple: British techies to advise on ‘devastating’ UK global crypto power grab
A hitherto unknown British organisation – which even the government may have forgotten about – is about to be drawn into a global technical and financial battle, facing threats from Apple to pull out of the UK Continue Reading
By- Duncan Campbell , 2QQ Ltd, Sussex University
- Bill Goodwin, Computer Weekly
-
News
07 Feb 2025
Tech companies brace after UK demands back door access to Apple cloud
The UK has served a notice on Apple demanding back door access to encrypted data stored by users anywhere in the world on Apple’s cloud service Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
07 Feb 2025
Ransomware payment value fell over 30% in 2024
Several factors, including the impact of law enforcement operations disrupting cyber criminal gangs and better preparedness among users, may be behind a significant drop in the total value of ransomware payments Continue Reading
By- Alex Scroxton, Security Editor
-
News
03 Feb 2025
DeepSeek-R1 more readily generates dangerous content than other large language models
Research scientists at cyber firm Enkrypt AI publish concerning findings from a red team exercise conducted against DeepSeek, the hot new generative AI tool Continue Reading
By- Alex Scroxton, Security Editor
-
Definition
31 Jan 2025
What is a certificate revocation list (CRL) and how is it used?
A certificate revocation list (CRL) is a list of digital certificates that have been revoked by the issuing certificate authority (CA) before their actual or assigned expiration date. Continue Reading
-
News
31 Jan 2025
Police swoop on Sky ECC cryptophone distributors in Spain and Holland
Dutch and Spanish police have arrested four people accused of making millions of euros by distributing Sky ECC encrypted phones to criminal organisations Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
31 Jan 2025
AI jailbreaking techniques prove highly effective against DeepSeek
Researchers at Palo Alto have shown how novel jailbreaking techniques were able to fool breakout GenAI model DeepSeek into helping to create keylogging tools, steal data, and make a Molotov cocktail Continue Reading
By- Alex Scroxton, Security Editor
-
News
31 Jan 2025
DeepSeek API, chat log exposure a ‘rookie’ cyber error
Security researchers at Wiz find a trove of DeepSeek data including API secrets and chat logs publicly exposed via an open source database management tool, raising questions about the fast-growing service’s approach to security Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
31 Jan 2025
Can security operations ever be fully autonomous?
Focusing on targeted improvements, not full automation, is key to scaling security operations with AI Continue Reading
By- Pete Shoard
-
News
29 Jan 2025
How government hackers are trying to exploit Google Gemini AI
Google’s threat intel squad has shared information on how nation state threat actors are attempting to exploit its Gemini AI tool for nefarious ends Continue Reading
By- Alex Scroxton, Security Editor
-
News
29 Jan 2025
Vallance rejects latest charge to reform UK hacking laws
Science minister Patrick Vallance rejects proposed amendments to the Computer Misuse Act, arguing that they could create a loophole for cyber criminals to exploit Continue Reading
By- Alex Scroxton, Security Editor
-
News
28 Jan 2025
NAO: UK government cyber resilience weak in face of mounting threats
The National Audit Office has found UK government cyber resilience wanting, weakened by legacy IT and skills shortages, and facing mounting threats Continue Reading
By- Brian McKenna, Enterprise Applications Editor
-
Definition
28 Jan 2025
What is spyware?
Spyware is a type of malicious software (malware) that is installed on a computing device without the end user's knowledge. Continue Reading
By- Katie Terrell Hanna
- Alexander S. Gillis, Technical Writer and Editor
- Kate Brush
-
E-Zine
28 Jan 2025
Turbulent times ahead for tech
In this week’s Computer Weekly, the World Economic Forum in Davos highlighted growing risks to digital supply chains – we examine the turbulence ahead. Data sovereignty is becoming a growing issue as companies move to the cloud – we look at the regulatory challenges. And we analyse the best practices in automated patch management. Read the issue now. Continue Reading
-
News
27 Jan 2025
Three sentenced over OTP.Agency MFA fraud service
Three men have been sentenced over their role in a cyber criminal subscription service that offered access to online accounts using illicitly obtained one-time passcodes Continue Reading
By- Alex Scroxton, Security Editor
-
News
27 Jan 2025
Inside CyberArk’s security strategy
CyberArk CIO Omer Grossman talks up the company’s security-first ethos, the importance of an assumed breach mentality and how the company is addressing threats from the growing use of AI Continue Reading
By- Aaron Tan, TechTarget
-
News
24 Jan 2025
US indicts five in fake North Korean IT contractor scandal
The US authorities have accused five men, including two American citizens, of involvement in a scheme which saw companies duped into hiring fake North Korean IT contractors Continue Reading
By- Alex Scroxton, Security Editor
-
News
24 Jan 2025
CISOs boost board presence by 77% over two years
A global research study, from Splunk and Oxford Economics, into how chief information security officers interact with boards finds greater participation but enduring gaps Continue Reading
By- Brian McKenna, Enterprise Applications Editor
-
News
22 Jan 2025
Funksec gang turned up ransomware heat in December
The criminal ransomware fraternity was hard at work over the festive period, with attack volumes rising and a new threat actor emerging on the scene Continue Reading
By- Alex Scroxton, Security Editor
-
Definition
22 Jan 2025
What is hacktivism?
Hacktivism is the act of misusing a computer system or network for a socially or politically motivated reason. Continue Reading
By- Katie Terrell Hanna
- Ben Lutkevich, Site Editor
- Madelyn Bacon, TechTarget
-
News
22 Jan 2025
APAC businesses face surge in email attacks
Sophisticated phishing and business email compromise campaigns are increasingly targeting organisations across the Asia-Pacific region, research reveals Continue Reading
By- Aaron Tan, TechTarget
-
E-Zine
21 Jan 2025
Will the UK become an AI powerhouse?
In this week’s Computer Weekly, we analyse the UK government’s new AI strategy and ask if the ambitious plans are achievable. The latest EU regulation affecting cyber security, called DORA, will affect digital resilience plans for many businesses – we examine the implications. We also look at the benefits and technologies behind cloud data lakes. Read the issue now. Continue Reading
-
News
20 Jan 2025
Singtel’s 5G network slicing to boost Singapore’s defence and security
Singapore’s defence and security technology agencies will leverage Singtel’s 5G network slicing technology nationwide to combat evolving security threats and enhance national security Continue Reading
By- Aaron Tan, TechTarget
-
News
16 Jan 2025
Biden signs new cyber order days before Trump inauguration
With days left in the White House, outgoing US president Joe Biden has signed a wide-ranging cyber security executive order with far-reaching implications Continue Reading
By- Alex Scroxton, Security Editor
-
News
16 Jan 2025
Russia’s Star Blizzard pivots to WhatsApp in spear-phishing campaign
The Russian cyber spy operation known as Star Blizzard changed tactics after a takedown operation by Microsoft and the US authorities, turning to widely used messaging platform WhatsApp to try to ensnare its targets Continue Reading
By- Alex Scroxton, Security Editor
-
News
16 Jan 2025
Davos 2025: Digital supply chains at risk as world faces two years of turbulence
World Economic Forum urges digital business leaders to build the resilience of supply chains, improve cyber defences and develop contingency plans Continue Reading
By- Bill Goodwin, Computer Weekly
-
Definition
15 Jan 2025
What is password cracking?
Password cracking is the process of using an application program to identify an unknown or forgotten password that allows access to a computer or network resource. Continue Reading
By- Rahul Awati
- Alexander S. Gillis, Technical Writer and Editor
-
Opinion
15 Jan 2025
What they don’t tell you about cyber attacks – the emotional impact on staff
CIO Sean Green writes about his experience of the emotional impact of a cyber attack on IT staff Continue Reading
By- Sean Green
-
News
15 Jan 2025
Davos 2025: Misinformation and disinformation are most pressing risks, says World Economic Forum
World leaders, business chiefs and civil society organisations will discuss the risks posed by misinformation, disinformation and artificial intelligence at the World Economic Forum Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
15 Jan 2025
Cohesity CEO on Veritas integration and IPO plans
Cohesity CEO Sanjay Poonen shares his vision for integrating Veritas’ enterprise data protection business, uniting 12,000 customers, driving AI-powered innovation and building a public-ready company Continue Reading
By- Aaron Tan, TechTarget
-
News
13 Jan 2025
UK government plans to extend ransomware payment ban
A ban on ransomware payments by UK government departments will be extended to cover organisations such as local councils, schools and the NHS should new government proposals move forward Continue Reading
By- Alex Scroxton, Security Editor
-
News
13 Jan 2025
CNI operators should ask these 12 questions of their OT suppliers
The NCSC, CISA and others have set out 12 cyber security considerations CNI organisations and other users of operational technology should incorporate into their buying processes to force their suppliers to do better Continue Reading
By- Alex Scroxton, Security Editor
-
News
10 Jan 2025
US bank FNBO uses Pindrop to tackle voice fraud, deepfakes
Learn how First National Bank of Omaha in the US is enhancing customer authentication and verification in its contact centres, eliminating friction points and making life easier for its customer service teams, with Pindrop voice security technology Continue Reading
By- Alex Scroxton, Security Editor
-
News
10 Jan 2025
Mandiant: Latest Ivanti vulns exploited by Chinese cyber spooks
Threat actors are once again lining up to exploit vulnerabilities in the widely used Ivanti product suite, with an apparent link to Chinese espionage activity Continue Reading
By- Alex Scroxton, Security Editor
-
News
08 Jan 2025
German court finds hacked EncroChat phone evidence inadmissible
The Berlin Regional Court has found that evidence obtained by a joint French and Dutch operation to hack the EncroChat encrypted mobile phone network is legally inadmissible, raising questions about its use in other European countries Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
07 Jan 2025
Regional skills plan to boost UK cyber defences
Over 30 projects in England and Northern Ireland will receive a share of a £1.9m fund designed to enhance cyber security skills and protect small businesses Continue Reading
By- Alex Scroxton, Security Editor
-
News
03 Jan 2025
US Treasury incident a clear warning on supply chain security in 2025
A cyber incident at the US Department of the Treasury – blamed on a Chinese state actor – raises fresh warnings about supply chain risk after it was found to have originated via vulnerabilities in a remote tech support product Continue Reading
By- Alex Scroxton, Security Editor
-
News
03 Jan 2025
Corporate cover-up behind world-beating cyber security record in Middle East
Report ranking Gulf corporations ahead of US and EU counterparts for cyber security has sparked debate about the region’s tendency for secrecy and state control Continue Reading
By -
News
31 Dec 2024
Top 10 surveillance, journalism and encryption stories of 2024
Revelations of covert and unlawful monitoring of journalists and their confidential sources by the Police Service of Northern Ireland and the Metropolitan Police attracted a huge amount of attention this year Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
19 Dec 2024
Top 10 ASEAN stories of 2024
Southeast Asia’s 2024 tech landscape saw major companies embracing AI, shifts in open source and the emergence of local large language models to address the needs of a diverse region Continue Reading
By- Aaron Tan, TechTarget
-
News
19 Dec 2024
LockBit ransomware gang teases February 2025 return
An individual associated with the LockBit ransomware gang has broken cover to tease details of a new phase of the cyber criminal operation's activity, which they claim is set to begin in February 2025 Continue Reading
By- Alex Scroxton, Security Editor
-
News
19 Dec 2024
Latest attempt to override UK’s outdated hacking law stalls
Amendments to the Data Bill that would have given the UK cyber industry a boost by updating restrictive elements of the Computer Misuse Act have failed to progress beyond a Lords committee Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
19 Dec 2024
The Data Bill: It’s time to cyber up
The Computer Misuse Act is outdated and needs reform - so it's disappointing to see the government decline an opportunity to update the legislation, says the peer who proposed amendments Continue Reading
By- Lord Chris Holmes, House of Lords
-
Opinion
19 Dec 2024
Innovation, insight and influence: the CISO playbook for 2025 and beyond
From Covid-19 to war in Ukraine, SolarWinds Sunburst, Kaseya, Log4j, MOVEit and more, the past five years brought cyber to mainstream attention, but what comes next? The Computer Weekly Security Think Tank looks ahead to the second half of the 2020s Continue Reading
By- Mandy Andress, Elastic
-
News
19 Dec 2024
French court refuses to expedite trial of Sky ECC cryptophone distributor Thomas Herdman
Canadian businessman Thomas Herdman, who was arrested by French police despite agreeing a deal to cooperate with US investigators, has been denied bail after 42 months in pre-trial detention Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
18 Dec 2024
The Security Interviews: Martin Lee, Cisco Talos
Threat intel expert and author Martin Lee, EMEA technical lead for security research at Cisco Talos, joins Computer Weekly to mark the 35th anniversary of the first ever ransomware attack Continue Reading
By- Alex Scroxton, Security Editor
-
News
18 Dec 2024
Top 10 cyber security stories of 2024
Data breaches, data privacy and protection, and the thorny issue of open source security were all hot topics this year. Meanwhile, security companies frequently found themselves hitting the headlines, and not always for good reasons. Here are Computer Weekly's top 10 cyber security stories of 2024 Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
18 Dec 2024
Look to the future: How the threat landscape may evolve next
From Covid-19 to war in Ukraine, SolarWinds Sunburst, Kaseya, Log4j, MOVEit and more, the past five years brought cyber to mainstream attention, but what comes next? The Computer Weekly Security Think Tank looks ahead to the second half of the 2020s Continue Reading
By- Elliott Wilkes, ACDS
-
News
18 Dec 2024
Top 10 cyber crime stories of 2024
From ransomware targeting the NHS to nation-state-backed intrusions, 2024 was another big year for cyber criminals and cyber spooks alike, but they didn't have it all their own way as the good guys fought back Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
17 Dec 2024
2025-30: Geopolitical influence on cyber and the convergence of threat
From Covid-19 to war in Ukraine, SolarWinds Sunburst, Kaseya, Log4j, MOVEit and more, the past five years brought cyber to mainstream attention, but what comes next? The Computer Weekly Security Think Tank looks ahead to the second half of the 2020s Continue Reading
By- Rob Dartnall, SecAlliance
-
News
17 Dec 2024
Conservative MP adds to calls for public inquiry over PSNI police spying
Conservative MP David Davis calls for a public inquiry following a court ruling that the PSNI and Metropolitan Police unlawfully placed journalists under electronic surveillance Continue Reading
By- Bill Goodwin, Computer Weekly
- Cormac Kehoe
-
News
17 Dec 2024
Tribunal criticises PSNI and Met Police for spying operation to identify journalists’ sources
The Investigatory Powers Tribunal has criticised the Police Service of Northern Ireland and the Metropolitan Police for unlawfully spying on journalists Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
17 Dec 2024
How NCS is tackling the enterprise IT market
The technology service provider is counting on its government experience, global expert network and cyber security capabilities to penetrate the enterprise IT market Continue Reading
By- Aaron Tan, TechTarget
-
Opinion
13 Dec 2024
Decoding the end of the decade: What CISOs should watch out for
From Covid-19 to war in Ukraine, SolarWinds Sunburst, Kaseya, Log4j, MOVEit and more, the past five years brought cyber to mainstream attention, but what comes next? The Computer Weekly Security Think Tank looks ahead to the second half of the 2020s Continue Reading
By- Paul Lewis, Nominet
-
News
13 Dec 2024
Computer Misuse Act reform gains traction in Parliament
An amendment to the proposed Data (Access and Use) Bill that will right a 35-year-old wrong and protect security professionals from criminalisation is to be debated at Westminster Continue Reading
By- Alex Scroxton, Security Editor
-
News
13 Dec 2024
How AWS is protecting customers from cyber threats
Amazon Web Services reveals how its threat intelligence capabilities work under the hood to thwart cyber attacks and keep its customers’ data safe Continue Reading
By- Aaron Tan, TechTarget
-
Opinion
12 Dec 2024
CISOs: Don’t rely solely on technical defences in 2025
From Covid-19 to war in Ukraine, SolarWinds Sunburst, Kaseya, Log4j, MOVEit and more, the past five years brought cyber to mainstream attention, but what comes next? The Computer Weekly Security Think Tank looks ahead to the second half of the 2020s Continue Reading
By- Deepti Gopal, Gartner
-
News
12 Dec 2024
Emerging Ymir ransomware heralds more coordinated threats in 2025
A newly observed ransomware strain has the community talking about more collaboration, and blurred lines, between threat groups next year, according to NCC’s monthly cyber barometer Continue Reading
By- Alex Scroxton, Security Editor
-
News
11 Dec 2024
Russia focuses cyber attacks on Ukraine rather than West despite rising tension
Computer Weekly talks to GCHQ’s National Cyber Security Centre operations director Paul Chichester and former NCSC chief executive Ciaran Martin on Russia, China and Salt Typhoon Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
10 Dec 2024
Dangerous CLFS and LDAP flaws stand out on Patch Tuesday
Microsoft has fixed over 70 CVEs in its final Patch Tuesday update of the year, and defenders should prioritise a zero-day in the Common Log File System Driver, and another impactful flaw in the Lightweight Directory Access Protocol Continue Reading
By- Alex Scroxton, Security Editor
-
News
10 Dec 2024
iOS vuln leaves user data dangerously exposed
Jamf threat researchers detail an exploit chain for a recently patched iOS vulnerability that enables a threat actor to steal sensitive data, warning that many organisations are still neglecting mobile updates Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
10 Dec 2024
Defending against cyber grinches: AI for enhanced security
On the Seventh Day of AI, Defending against cyber grinches: AI for enhanced security, we explore the double-edged sword of AI in cybersecurity and how businesses can protect themselves against the cyber grinches. Continue Reading
By- Justin Young, ANS
-
News
10 Dec 2024
Top IT predictions in APAC in 2025
Enterprises across the Asia-Pacific region are expected to focus on securing their AI workloads, invest in energy efficient infrastructure and rethink their platform strategy, among other tech trends in the new year Continue Reading
By- Aaron Tan, TechTarget
-
10 Dec 2024
NCSC boss calls for ‘sustained vigilance’ in an aggressive world
Richard Horne, the CEO of NCSC, echoed wider warnings about the growing number and severity of cyber threats facing the UK as he launched the security body’s eighth annual report. Continue Reading
-
E-Zine
10 Dec 2024
On the road to change at Aston Martin
In this week’s Computer Weekly, we talk to the CIO at luxury car maker Aston Martin to find out how technology is helping tackle the huge challenges facing the automotive sector. The new National Cyber Security boss explains why organisations need to be extra vigilant against the growing online threats. And we examine the future of secure remote connectivity in the cloud era. Read the issue now. Continue Reading
-
Opinion
09 Dec 2024
In 2025: Identities conquer, and hopefully unite
From Covid-19 to war in Ukraine, SolarWinds Sunburst, Kaseya, Log4j, MOVEit and more, the past five years brought cyber to mainstream attention, but what comes next? The Computer Weekly Security Think Tank looks ahead to the second half of the 2020s Continue Reading
By- Stephen McDermid, Okta
-
News
09 Dec 2024
Bahrain faces legal action after planting Pegasus spyware on UK blogger
A court has given the go-ahead to UK-based blogger Yusuf Al-Jamri to seek damages from the Kingdom of Bahrain after it deployed spyware from Israel’s NSO Group to hack his phone Continue Reading
By- Bill Goodwin, Computer Weekly
-
Opinion
06 Dec 2024
Six trends that will define cyber through to 2030
From Covid-19 to war in Ukraine, SolarWinds Sunburst, Kaseya, Log4j, MOVEit and more, the past five years brought cyber to mainstream attention, but what comes next? The Computer Weekly Security Think Tank looks ahead to the second half of the 2020s Continue Reading
By- Pierre-Martin Tardif, ISACA
-
News
06 Dec 2024
TfL cyber attack cost over £30m to date
TfL provides more detail on the financial impact of the September 2024 cyber attack that crippled several of its online systems Continue Reading
By- Alex Scroxton, Security Editor
-
News
05 Dec 2024
Government agencies urged to use encrypted messaging after Chinese Salt Typhoon hack
Chinese hacking of US telecom networks raises questions about the exploitation by hostile hacking groups of government backdoors to provide lawful access to telecoms services Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
04 Dec 2024
Shared digital gateway was source of three NHS ransomware attacks
Alder Hey children’s hospital confirms ransomware operators accessed its systems through a shared digital gateway, but is standing firm in the face of the gang’s demands Continue Reading
By- Alex Scroxton, Security Editor
-
News
04 Dec 2024
NCA takes out network that laundered ransomware payments
NCA-led Operation Destabilise disrupts Russian crime networks that funded the drugs and firearms trade in the UK, helped Russian oligarchs duck sanctions, and laundered money stolen from the NHS and others by ransomware gangs Continue Reading
By- Alex Scroxton, Security Editor