News
IT security
-
June 17, 2025
17
Jun'25
Cyber action plan kicks off to ‘supercharge’ UK security sector
UK government says its cyber growth action plan will provide a large boost to Britain’s security industry as it sets out to create a roadmap for future growth
-
June 17, 2025
17
Jun'25
Scattered Spider widens web to target insurance sector
Following a series of high-profile attacks on prominent retailers and consumer brands, the Scattered Spider cyber crime collective appears to be expanding its targeting to the insurance sector
-
June 17, 2025
17
Jun'25
UKtech50: Vote for the most influential person in UK technology
Our judges have selected the top 50 leaders from a shortlist of nearly 500 people – now it’s your chance to tell us who you think is the most influential person in UK technology
-
June 16, 2025
16
Jun'25
Intelligence sharing key to cyber security in Europe, says EU Commission cyber expert
Cyber criminals choose not to attack Europe due to its resilience and preparedness, says the EU Commission’s principal advisor for cyber security coordination, Despina Spanou
-
June 12, 2025
12
Jun'25
UKtech50 2025: the longlist of the UK’s influential tech leaders
Each year, Computer Weekly launches a search for the most influential people in UK IT, asking the tech community who it thinks should be in the top 50 – here is the longlist of everyone nominated for 2025
-
June 12, 2025
12
Jun'25
Apple encryption row: Does law enforcement need to use Technical Capability Notices?
History shows that law enforcement can bring successful prosecutions without the need for the Home Office to introduce ‘backdoors’ into end-to-end encryption
-
June 12, 2025
12
Jun'25
MPs to investigate potential for government digital identity scheme
Amid growing calls for a national digital ID scheme, Home Affairs Committee launches inquiry into likely benefits and risks
-
June 11, 2025
11
Jun'25
NHS IT the big winner in Reeves’ Spending Review
The chancellor of the exchequer has significantly upped spending on digital and technology initiatives in the current Spending Review period, with the NHS receiving a 50% tech funding increase
-
June 11, 2025
11
Jun'25
WhatsApp seeks to join Apple in legal challenge against Home Office encryption orders
WhatsApp today applied to intervene in an Investigatory Powers Tribunal case that is considering the UK’s ability to issue a technical capability notice on Apple to ‘weaken encryption’
-
June 11, 2025
11
Jun'25
Government using national security as ‘smokescreen’ in Apple encryption row
Senior conservative MP David Davis says the Home Office should disclose how many secret orders it has issued against telecoms and internet companies to Parliament
-
June 11, 2025
11
Jun'25
How breaking things builds resilient systems
To prevent and recover from outages in today’s complex, cloud-native world, enterprises must proactively and deliberately inject failure into their systems though chaos engineering practices
-
June 11, 2025
11
Jun'25
June Patch Tuesday brings a lighter load for defenders
Barely 70 vulnerabilities make the cut for Microsoft’s monthly security update, but an RCE flaw in WEBDAV and an EoP issue in Windows SMB Client still warrant close attention
-
June 11, 2025
11
Jun'25
Cyber Bill at risk of becoming a missed opportunity, say MPs
An APPG report warns that the government’s flagship cyber security legislation is too narrow in its scope and risks missing opportunities to embed resilience at the heart of the British economy
-
June 10, 2025
10
Jun'25
UK defence scheme invests in future cyber tech Cheri
Cambridge-based SCI Semiconductors is awarded DTEP funding to work on the application of defensive Cheri technology
-
June 10, 2025
10
Jun'25
Third-party security weaknesses threaten Europe’s big banks
Security breaches via third parties increased by 25% at Europe’s largest finance firms
-
June 09, 2025
09
Jun'25
US lawmakers say UK has ‘gone too far’ by attacking Apple’s encryption
US politicians are calling for Congress to rewrite the US Cloud Act to prevent the UK issuing orders to require US tech companies to introduce ‘backdoors’ in end-to-end encrypted messaging and storage
-
June 06, 2025
06
Jun'25
UK ICO publishes AI and biometrics strategy
The UK data regulator has outlined how it will approach the regulation of artificial intelligence and biometric technologies, which will focus in particular on automated decision-making systems and police facial recognition
-
June 06, 2025
06
Jun'25
CISOs must translate cyber threats into business risk
To manage risk effectively and secure board-level buy-in, CISOs must stop talking about technology and start speaking the language of business, according to a senior Check Point executive
-
June 05, 2025
05
Jun'25
HMRC phishing breach wholly avoidable, but hard to stop
A breach at HMRC saw innocent taxpayers tricked into letting scammers impersonate them through simple phishing attacks leading to account takeover. Such attacks are avoidable, but hard to stop
-
June 05, 2025
05
Jun'25
UK’s error-prone eVisa system is ‘anxiety-inducing’
People experiencing technical errors with the Home Office’s electronic visa system explain the psychological toll of not being able to reliably prove their immigration status in the face of a hostile and unresponsive bureaucracy
-
June 05, 2025
05
Jun'25
How GitLab is tapping AI in DevSecOps
GitLab CISO Josh Lemos explains how the company is weaving AI, through its Duo tool, into the entire software development lifecycle to enhance efficiency and automate incident response
-
June 04, 2025
04
Jun'25
Put ROCs before SOCs, Qualys tells public sector
Putting risk operations before security operations may help government agencies and other public sector bodies better manage the myriad threats they face, and make better decisions for the security of all
-
June 04, 2025
04
Jun'25
NCSC sets out how to build cyber safe cultures
The UK’s National Cyber Security Centre has published guidance for security teams and leaders on how to foster accessible and appropriate cyber security cultures in their organisations
-
June 04, 2025
04
Jun'25
Investigatory powers: Guidelines for police and spies could also help businesses with AI
Computer Weekly talks to Muffy Calder, technology advisor to the UK’s investigatory powers commissioner, about privacy, intrusion and artificial intelligence
-
June 04, 2025
04
Jun'25
Microsoft outlines three-pronged European cyber strategy
Microsoft chair Brad Smith outlines an expansive cyber programme targeting governments across Europe with enhanced threat intelligence and support
-
June 04, 2025
04
Jun'25
European Commission should rescind UK data adequacy
Civil society organisations have urged the European Commissioner to not renew the UK’s data adequacy, given the country’s growing divergence from European data protection standards
-
June 04, 2025
04
Jun'25
Infosecurity 2025: SMEs feel on their own in the face of cyber attacks
Project findings to be presented at Infosecurity Europe 2025 highlight vulnerability of SMEs to cyber attack
-
June 03, 2025
03
Jun'25
SailPoint charts course for AI-driven identity security
SailPoint is driving the use of agentic AI in identity security with its Harbor Pilot offering while preparing to help enterprises govern and secure AI agents
-
June 02, 2025
02
Jun'25
US cyber agency CISA faces stiff budget cuts
CISA is one of several US agencies facing drastic budget cuts under the Trump administration
-
June 02, 2025
02
Jun'25
Cyber and digital get over £1bn to enhance UK’s national security
The government has set out plans to spend over a billion pounds on digital and cyber warfare capabilities to enhance the UK’s ability to defend itself and fight offensive wars
-
June 02, 2025
02
Jun'25
Infosecurity 2025: NCA cyber intelligence head spells out trends
Will Lyne, head of cyber intelligence at the National Crime Agency, sketches out cyber criminal trends as ransomware and other attack varieties become democratised beyond Russophone, skilled software developers
-
May 30, 2025
30
May'25
Dutch businesses lag behind in cyber resilience as threats escalate
While non-IT business professionals in the middle of their careers face the most disruption from AI, professionals in the IT services sector and their employers must prepare for change
-
May 30, 2025
30
May'25
Noisy quantum hardware could crack RSA-2048 in seven days
Research highlights the need for quantum safe cryptography given the speed with which quantum computing is evolving
-
May 30, 2025
30
May'25
Cloud migration demands contractual safeguards and clear strategy
Cyber security experts urge organisations to define clear objectives, understand shared security models and implement strong data governance when migrating workloads to the cloud
-
May 29, 2025
29
May'25
Gov.uk Wallet open to public sector bodies
Government departments can soon begin to add documents to Gov.uk Wallet, as the Government Digital Service publishes guidance for public sector bodies on how to use the smartphone app
-
May 28, 2025
28
May'25
UK biometric surveillance exists in ‘legal grey area’
The rapid proliferation of ‘biometric mass surveillance technologies’ throughout the UK’s public and private sectors is taking place without legal certainty or adequate safeguards for the public
-
May 28, 2025
28
May'25
Adidas confirms customer data was accessed during cyber attack
Sportswear manufacturer Adidas has confirmed its systems were infiltrated by an unauthorised third party
-
May 28, 2025
28
May'25
Remote purchase fraud surges 14%, says banking industry
Brits lost over £1bn to payment fraud in its many forms last year, according to the latest banking industry numbers
-
May 27, 2025
27
May'25
Maturing UK fintechs increase tech and cyber security hiring
Increased hiring reflects that fintechs are maturing and now require more cyber security and compliance experts
-
May 27, 2025
27
May'25
US makes fresh indictments over DanaBot, Qakbot malwares
US charges the operators of two malwares, DanaBot and Qakbot, whose actions led to millions of dollars worth of cyber theft and fraud
-
May 27, 2025
27
May'25
Armed forces charity steps in to address cyber mental health crisis
CIISec and military charity PTSD Resolution hope to address a gathering mental health crisis among frontline cyber professionals
-
May 23, 2025
23
May'25
Essex Police discloses ‘incoherent’ facial recognition assessment
An equality impact assessment of Essex Police live facial recognition deployments is plagued by inconsistencies and poor methodology, undermining the force’s claim that its use of the technology will not be discriminatory
-
May 22, 2025
22
May'25
Microsoft raises posse to target dangerous Lumma malware
Microsoft, along with a consortium of partners, has seized and disrupted a significant part of the Lumma malware-as-a-service network used to steal data and funds
-
May 22, 2025
22
May'25
How to tackle your infrastructure technical debt
Gartner analysts explain how infrastructure and operations teams can address the accumulation of outdated systems and make a compelling business case for upgrades
-
May 21, 2025
21
May'25
M&S cyber attack disruption likely to last until July
M&S says it has moved into recovery mode after a ransomware attack, but expects some disruption to persist throughout the coming weeks
-
May 21, 2025
21
May'25
NCSC: Russia’s Fancy Bear targeting logistics, tech organisations
The NCSC and its partner agencies have blown the whistle on an extensive campaign of malicious cyber attacks orchestrated by the Russian state Fancy Bear operation
-
May 21, 2025
21
May'25
Capital One pushes out data tokenisation
Organisations using the Databricks and Snowflake platforms will be able to use Capital One’s Databolt tool to secure their data
-
May 21, 2025
21
May'25
Strong fintech security posture at risk via third-party weak links
Despite having a strong security posture, the financial technology sector could be open to attack via third parties
-
May 21, 2025
21
May'25
Ransomware attacks dropped by a third last month
Reported ransomware attacks eased off during April following a dramatic spike in the first quarter of 2025
-
May 20, 2025
20
May'25
Dell unveils disaggregated infrastructure strategy
Dell makes push for disaggregated infrastructure, aiming to offer enterprises the independent scaling of three-tier architectures with the operational benefits of hyperconverged systems