Recent Blog Posts
Hackers and cybercrime prevention
This is a guest post by Tom Kellermann, head of cyber security strategy at VMware Carbon Black 2020 has been a year like no other. The global pandemic has quickly changed work and business as we ...
A smart chastity cage that can only be controlled via its app was vulnerable to hackers putting almost 40,000 penises on lockdown, research has revealed. Sex toy manufacturer Qiui muses on its ...
The managing director of a Premier League side almost cost their club £1m when their email address was hacked during a transfer negotiation – but who could it be? Our first guess was Richard Arnold ...
In yet another example of the risks of supply chain vulnerabilities, Singapore’s Ministry of Defence (Mindef) recently disclosed that the confidentiality of its personnel's personal data could have ...
At a recent event marking the launch of Trend Micro’s regional headquarters in Singapore this week, the company’s executives cited Singapore’s vision and influence over ASEAN in cyber security ...
The Singapore government’s Committee of Inquiry (COI) that looked into the unprecedented cyber attack on SingHealth’s IT systems released a public report this week, detailing security lapses ...
E-commerce in Asia-Pacific is booming, with 71% of consumers in the region already shopping online. But so is the risk of fraud, with one in five consumers falling victim, according to new report ...
The Full Spectrum
Do ISPs need to do more to protect their users from scams?
Security Editor 11 May 2018Are Britain’s internet service providers (ISPs) coming up short when it comes to helping their less tech-savvy users protect themselves against the scourge of telephone scams and online fraud? In a ...
One of machine learning’s most well-known use cases is fraud detection, an area that has drawn the attention of a growing number of technology suppliers looking to develop the best algorithms and ...
Computer Weekly Editors Blog
Is cyber security becoming a cost of doing business - to the detriment of our data?
Editor in chief 23 Feb 2018Computer Weekly writes a lot about cyber security – it’s the easily most popular topic among our readers, and always rates as one of the top priorities in our annual survey of IT professionals. ...
The Neil Buchanan of Vietnamese cyber security has pulled Apple’s pants down by making a mask that can trick the iPhone X’s facial recognition technology. Come and have a look at this. Now, to make ...
When one is confronted by a criminal or terrorist demanding a ransom in exchange for a loved one who has been held hostage, the general rule of thumb is not to pay up and go to the police. That’s ...
When StarHub’s residential fibre network went down in October 2016, the Singapore telco initially pinned the blame on distributed denial of service (DDoS) attacks brought on by internet of things ...
The lack of a major cyber security event is seen as one of the reasons for the indifference towards cyber security in many organisations. That event took place recently, with the WannaCry ...
Computer Weekly Editors Blog
UK government, NHS and Windows XP support - what really happened
Editor in chief 15 May 2017In all the debate about the NHS ransomware attack, much has been made of a government decision in 2015 to end a contract with Microsoft to provide support for the ageing Windows XP operating system ...
Bad-bots are being used by cybercriminals to automate many time-consuming activities to perpetrate their crimes. Payment card fraud is an area of particular concern as large data bases of stolen ...
Computer Weekly Editors Blog
Breach, rinse, repeat - when will companies get the IT security basics right?
Editor in chief 23 Sep 2016The news that Yahoo suffered a security breach affecting half a billion users has heads shaking and critics justifiably slamming corporate security practices once more. We seem to be stuck in a ...