Hackers and cybercrime prevention
-
News
29 Apr 2025
Scattered Spider on the hook for M&S cyber attack
The infamous Scattered Spider hacking collective may have been behind the ongoing cyber attack on Marks and Spencer that has crippled systems at the retailer and left its ecommerce operation in disarray. Continue Reading
By- Alex Scroxton, Security Editor
-
News
29 Apr 2025
Kaspersky calls for cyber immunity amid growing cyber threats
The rise of professional cyber crime groups and state-sponsored actors targeting critical infrastructure requires a move towards inherently secure ‘cyber immune’ systems, says Kaspersky CEO Eugene Kaspersky Continue Reading
By- Aaron Tan, TechTarget
-
E-Zine
29 Apr 2025
Making divorce digital
In this week’s Computer Weekly, we talk to the CEO of the National Family Mediation charity about its tech overhaul and how divorce is going digital. The government’s One Login digital identity system is under scrutiny over security problems – we examine the issues. And we explain what’s happening in the UK competition watchdog’s investigation into AWS and Microsoft cloud services. Read the issue now. Continue Reading
-
News
25 Apr 2025
M&S suspends all online sales as cyber attack worsens
M&S shuts down online sales as it works to contain and mitigate a severe cyber attack on its systems Continue Reading
By- Alex Scroxton, Security Editor
-
News
24 Apr 2025
M&S systems remain offline days after cyber incident
M&S is still unable to provide contactless payment or click-and-collect services amid a cyber attack that it says has forced it to move a number of processes offline to safeguard its customers, staff and business Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
24 Apr 2025
Challenges persist as UK’s Cyber Security and Resilience Bill moves forward
Elements of the Cyber Security and Resilience Bill are welcome but questions remain about how best to act in the face of persistent challenges like geopolitical chaos, threats to critical infrastructure, and technological advances Continue Reading
By- James Morris, CSBR
-
News
24 Apr 2025
March ransomware slowdown probably a red herring
An apparent slowdown in ransomware attack volumes is raising eyebrows, but the statistics never tell the full story Continue Reading
By- Alex Scroxton, Security Editor
-
News
23 Apr 2025
Financially motivated cyber crime remains biggest threat source
Mandiant’s latest annual threat report reveals data on how financially motivated cyber criminals, such as ransomware gangs, dominate the cyber security landscape Continue Reading
By- Alex Scroxton, Security Editor
-
Feature
23 Apr 2025
Enterprise strategies for API management
Application programming interfaces are the connective tissue of the modern enterprise, driving innovation and integration. But managing them effectively requires enterprises to consider governance, security and lifecycle management while preparing for emerging threats and technologies like AI Continue Reading
By- Aaron Tan, TechTarget
-
News
22 Apr 2025
Cyber attack downs systems at Marks & Spencer
A cyber attack at Marks & Spencer has caused significant disruption to customers, leaving them unable to make contactless payments or use click-and-collect services Continue Reading
By- Alex Scroxton, Security Editor
-
News
22 Apr 2025
Cyber ‘agony aunts’ launch guidebook for women in security
Cyber ‘agony aunts’ Amelia Hewitt and Rebecca Taylor are launching a book aimed at empowering women in their cyber security careers Continue Reading
By- Alex Scroxton, Security Editor
-
News
22 Apr 2025
AI-powered APIs proving highly vulnerable to attack
The growth of AI is proving a double-edged sword for API security, presenting opportunities for defenders to enhance their resilience, but also more risks from AI-powered attacks, according to report Continue Reading
By- Alex Scroxton, Security Editor
-
Definition
21 Apr 2025
What is a brute-force attack?
A brute-force attack is a trial-and-error hacking method cybercriminals use to decode login information and encryption keys to gain unauthorized access to systems. Continue Reading
By- Mary E. Shacklett, Transworld Data
- Katie Terrell Hanna
-
Feature
18 Apr 2025
How do cybercriminals steal credit card information?
Cybercriminals have various methods at their disposal to hack and exploit credit card information. Learn what they are, how to prevent them and what to do when hacked. Continue Reading
By- Stephen J. Bigelow, Senior Technology Editor
-
17 Apr 2025
Norway says ‘no way’ to global financial crime
Oslo’s startup ecosystem is fighting back against cyber criminals with tech to wipe out attacks rather than just detect them. Continue Reading
-
E-Zine
17 Apr 2025
CW EMEA: Shutting down cyber crime
In the Netherlands, the average ransomware attack costs firms about €514,000, and these huge sums mean it makes sense that the police invest their time and resources into combating it. One PhD student spent four years embedded in Dutch police cyber teams to conduct research on their efficacy. Continue Reading
-
17 Apr 2025
Dutch police disrupt half of ransomware operations, finds embedded PHD student
Dutch PhD study reveals the impact of centralised intelligence and strategic interventions in the fight against ransomware. Continue Reading
-
Opinion
17 Apr 2025
Collaboration is the best defence against nation-state threats
The rise of DeepSeek has prompted the usual well-documented concerns around AI, but also raised worries about its potential links to the Chinese state. The Security Think Tank considers the steps security leaders can take to counter threats posed by nation state industrial espionage? Continue Reading
By- Stephen McDermid, Okta
-
News
16 Apr 2025
CISA extends Mitre CVE contract at last moment
The US Cybersecurity and Infrastructure Security Agency has ridden to the rescue of the under-threat Mitre CVE Programme, approving a last-minute, 11-month contract extension to preserve the project’s vital security vulnerability work Continue Reading
By- Alex Scroxton, Security Editor
-
News
16 Apr 2025
CVE Foundation pledges continuity after Mitre funding cut
With news that Mitre’s contract to run the world-renowned CVE Programme is abruptly terminating, a breakaway group is setting up a non-profit foundation to try to ensure the project’s continuity Continue Reading
By- Alex Scroxton, Security Editor
-
News
16 Apr 2025
Security leaders grapple with AI-driven threats
Experts warn of AI’s dual role in both empowering and challenging cyber defences, and called for intelligence sharing and the need to strike a balance between AI-driven innovation and existing security practices Continue Reading
By- Aaron Tan, TechTarget
-
News
15 Apr 2025
Mitre warns over lapse in CVE coverage
Mitre, the operator of the world-renowned CVE repository, has warned of significant impacts to global cyber security standards, and increased risk from threat actors, as it emerges its US government contract will lapse imminently Continue Reading
By- Alex Scroxton, Security Editor
-
News
15 Apr 2025
Hertz warns UK customers of Cleo-linked data breach
Car hire giant Hertz reveals UK customer data was affected in a cyber incident orchestrated via a series of vulnerabilities in Cleo managed file transfer products Continue Reading
By- Alex Scroxton, Security Editor
-
News
14 Apr 2025
Government faces claims of serious security and data protection problems in One Login digital ID
The Government Digital Service was warned about serious cyber security and data protection problems in its flagship digital identity system, with insider claims that the data of three million users may still be at risk Continue Reading
By- Bryan Glick, Editor in chief
-
Opinion
14 Apr 2025
Defending the grid with secure connectivity
Connectivity providers, device manufacturers and the energy companies they support must prioritise cyber security as the use of IoT grows in Singapore's energy sector Continue Reading
By- Simon Trend
-
News
11 Apr 2025
Warranty fraud fuels hidden army of hardware hackers
Widespread warranty fraud is not only costing companies billions but also creating a breeding ground for advanced hardware exploits, warns hardware hacker and researcher Bunnie Huang at Black Hat Asia 2025 Continue Reading
By- Aaron Tan, TechTarget
-
News
10 Apr 2025
Google bets on unifying security tools to ease CISO pain
At Google Cloud Next in Las Vegas, Google launches its Unified Security platform with the goal of bringing together disparate security solutions to help cyber leaders and practitioners address their most keenly felt pain points Continue Reading
By- Alex Scroxton, Security Editor
-
Feature
10 Apr 2025
GCHQ historian Dave Abrutat’s mission to preserve the UK’s forgotten signals intelligence history
Dave Abrutat, GCHQ’s official historian, is on a mission to preserve the UK’s historic signals intelligence sites and capture their stories before they disappear from folk memory. A new charity, NSIST, will raise funds and recruit volunteers Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
10 Apr 2025
Spirit of openness helps banks get serious about stopping scams
Recent announcements show that banks, financial services firms and IT companies are increasing efforts to curb online scams Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
09 Apr 2025
Microsoft’s April 2025 bumper Patch Tuesday corrects 124 bugs
Microsoft is correcting 124 vulnerabilities in its March Patch Tuesday, one of which is being actively exploited in the wild, and 11 of which are ‘critical’ Continue Reading
By- Brian McKenna, Enterprise Applications Editor
-
News
08 Apr 2025
NCSC issues warning over Chinese Moonshine and BadBazaar spyware
Two spyware variants are being used to target the mobile devices of persons of interest to Chinese intelligence, including individuals in the Taiwanese, Tibetan and Uyghur communities Continue Reading
By- Alex Scroxton, Security Editor
-
News
08 Apr 2025
Spoofing vuln threatens security of WhatsApp Windows users
Meta has disclosed and patched a potentially dangerous spoofing flaw in WhatsApp for Windows that could have caused big problems for unwitting users Continue Reading
By- Alex Scroxton, Security Editor
-
News
08 Apr 2025
Government punts cyber governance code of practice for UK businesses
The Department for Science, Innovation and Technology’s cyber security minister Feryal Clark announces a cyber security code of governance for UK businesses to follow Continue Reading
By- Brian McKenna, Enterprise Applications Editor
-
News
08 Apr 2025
Over £18m stolen from Santander UK customers in first three months of year
Bank’s latest quarterly report on scams said over £18m was stolen from its UK customers by scammers Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
Video
07 Apr 2025
An explanation of cybercrime
Cybercrime refers to criminal activity that uses a computer, networked device or network. Its many forms, from extortion to identity theft, can cause real damage to organizations. Continue Reading
By- Tommy Everson, Assistant Editor
-
News
07 Apr 2025
NIST calls time on older vulnerabilities amid surging disclosures
The National Institute of Standards and Technology is deferring future updates to thousands of cyber vulnerabilities discovered prior to 2018 amid surging volumes of new submissions Continue Reading
By- Alex Scroxton, Security Editor
-
News
07 Apr 2025
Court rejects Home Office bid for blanket secrecy in hearings over Apple encryption case
Investigatory Powers Tribunal rejects Home Office arguments that identifying the ‘bare details’ of legal action by Apple would damage national security, leaving open possibility of future open court hearings Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
07 Apr 2025
Fintech body calls on government for national anti-fraud centre
Industry body says a national anti-fraud centre could be the vehicle required to effectively fight fraud through data sharing Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
04 Apr 2025
Norway and Nordic financial sector ramps up cyber security
Finans Norge sets up cyber security unit CTSU to support the finance sector in Norway amid increasing threats Continue Reading
By- Gerard O'Dwyer
-
News
04 Apr 2025
Banks to share fraud data with tech firms in cross-sector collaboration
UK banks join tech firms in fraud data-sharing initiative to enable collaboration on action to stop online scams Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
03 Apr 2025
Are LLM firewalls the future of AI security?
As large language models permeate industries, experts at Black Hat Asia 2025 debate the need for LLM firewalls and explore their role in fending off emerging AI threats Continue Reading
By- Aaron Tan, TechTarget
-
Opinion
02 Apr 2025
Apple’s appeal to the Investigatory Powers Tribunal over the UK’s encryption ‘backdoor’ explained
Apple has appealed to the Investigatory Powers Tribunal over an order by home secretary Yvette Cooper to give the UK access to customers’ data protected by Advanced Data Protection encryption. What happens next? Continue Reading
By- Bernard Keenan, UCL
-
News
02 Apr 2025
UKtech50 2025 – help us find the most influential people in UK IT
Computer Weekly’s annual search for the 50 most influential people in UK IT is on – let us know who you would like to nominate for this year's list Continue Reading
By -
News
01 Apr 2025
Apple devices are at ‘most risk’ in UK following government ‘backdoor’ order
Home Office refuses to answer questions from Lords over technical capability notice issued against Apple’s iCloud Advanced Data Protection encryption services Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
31 Mar 2025
Top 1,000 IT service providers in scope of UK cyber bill
The government’s proposed Cyber Security and Resilience Bill is set to include regulatory provisions covering both datacentre operators and larger IT service providers Continue Reading
By- Alex Scroxton, Security Editor
-
Definition
31 Mar 2025
What is a hacker?
A hacker is an individual who uses computer, networking or other skills to overcome a technical problem. Continue Reading
-
Opinion
28 Mar 2025
Countering nation-state cyber espionage: A CISO field guide
The rise of DeepSeek has prompted the usual well-documented concerns around AI, but also raised worries about its potential links to the Chinese state. The Security Think Tank considers the steps security leaders can take to counter threats posed by nation state industrial espionage? Continue Reading
By- Andrew Hodges, Quorum Cyber
-
News
26 Mar 2025
Advanced Software fined £3m over LockBit attack
The ICO has issued a £3m fine to software provider Advanced in the wake of security failings that led to significant disruption to NHS customers in a ransomware attack Continue Reading
By- Alex Scroxton, Security Editor
-
News
25 Mar 2025
Tech specialist files legal claim after being refused security clearance for MI6 role
An IT specialist has asked the Investigatory Powers Tribunal to investigate a series of hacking incidents after disclosing their social media accounts to MI6 vetting staff Continue Reading
By- Bill Goodwin, Computer Weekly
-
Opinion
24 Mar 2025
Why I am challenging Yvette Cooper’s ‘secret backdoor’ order against Apple’s encryption
I took steps to lock down all personal data after I was named as an opponent of Russia. Now I am again worried about my family's safety after the home secretary issued a secret order against Apple Continue Reading
By- Gus Hosein
-
Opinion
24 Mar 2025
Will DeepSeek force us to take application security seriously?
The rise of DeepSeek has prompted the usual well-documented concerns around AI, but also raised worries about its potential links to the Chinese state. The Security Think Tank considers the steps security leaders can take to counter threats posed by nation state industrial espionage? Continue Reading
By- Mike Gillespie and Ellie Hurst
-
News
21 Mar 2025
NCSC, DSIT enlist IBM to spearhead cyber diversity agenda
IBM signs on to a partnership deal in support of the popular NCSC CyberFirst Girls scheme designed to foster gender diversity in the cyber security profession Continue Reading
By- Alex Scroxton, Security Editor
-
News
19 Mar 2025
Clop resurgence drives ransomware attacks in February
The exploitation of two new vulnerabilities in a popular file transfer service saw the Clop ransomware gang soar in February, according to NCC Continue Reading
By- Alex Scroxton, Security Editor
-
E-Zine
18 Mar 2025
UK under-prepared for catastrophic cyber attack
In this week’s Computer Weekly, MPs have been told the UK is under-prepared to cope with a catastrophic cyber attack – we find out where the problems lie. Our new buyer’s guide assesses the challenges of datacentre capacity planning. And one of the UK’s most successful businessmen, Sir Martin Sorrell, gives his view on the risks and opportunities of AI. Read the issue now. Continue Reading
-
News
18 Mar 2025
Seaco charts course for unified security strategy
Shipping container leasing giant consolidates security tools onto a single platform, leveraging AI and extended detection and response to improve security operations Continue Reading
By- Aaron Tan, TechTarget
-
News
17 Mar 2025
How Oracle is using AI to combat financial crime
The tech giant is leveraging artificial intelligence to surface fraudulent financial transactions and improve the efficiency of financial crime investigations, offering relief to banks battling high costs and alert fatigue Continue Reading
By- Aaron Tan, TechTarget
-
News
14 Mar 2025
Apple encryption legal challenge heard behind closed doors despite calls for public hearing
Investigatory Powers Tribunal hearing held behind closed doors as press and civil society groups argue for open hearings Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
13 Mar 2025
Chinese espionage group UNC3886 targets Juniper routers
Advanced persistent threat group UNC3886 deployed custom backdoors on end-of-life Juniper Networks routers, underscoring the need for timely patching and advanced security monitoring Continue Reading
By- Aaron Tan, TechTarget
-
News
13 Mar 2025
US Congress demands UK lifts gag on Apple encryption order
Apple and Google have told US lawmakers that they cannot tell Congress whether they have received technical capability notices from the UK Continue Reading
By- Bill Goodwin, Computer Weekly
- Duncan Campbell , 2QQ Ltd, Sussex University
-
News
13 Mar 2025
SuperBlack ransomware may have ties to LockBit
Forescout researchers report on a new ransomware gang that appears to be keeping the legacy of the notorious LockBit crew alive Continue Reading
By- Alex Scroxton, Security Editor
-
News
13 Mar 2025
HMRC looks to upgrade SOC with advanced SIEM tech
HMRC issues a request for information notice ahead of opening up bids for a new security information and event management project that aims to reinforce its ability to respond to cyber threats Continue Reading
By- Alex Scroxton, Security Editor
-
News
12 Mar 2025
iPhone, iPad update fixes critical WebKit flaw
iPhone and iPad users are advised to update their devices as Apple addresses an out-of-bounds write issue in the WebKit browser engine that appears to have been exploited in targeted cyber attacks Continue Reading
By- Alex Scroxton, Security Editor
-
News
11 Mar 2025
Musk claims of Ukraine DDoS attack derided by cyber community
Elon Musk draws criticism after accusing Ukraine of being behind a significant DDoS attack against social media platform X Continue Reading
By- Alex Scroxton, Security Editor
-
News
11 Mar 2025
Perimeter security appliances source of most ransomware hits
Perimeter security appliances and devices, particularly VPNs, prove to be the most popular entry points into victim networks for financially motivated ransomware gangs, according to reports Continue Reading
By- Alex Scroxton, Security Editor
-
News
11 Mar 2025
Dutch police disrupt half of ransomware operations, finds embedded PHD student
Dutch PhD study reveals the impact of centralised intelligence and strategic interventions in the fight against ransomware Continue Reading
By- Kim Loohuis
-
News
11 Mar 2025
Secret London tribunal to hear appeal in Apple vs government battle over encryption
Campaigners call for High Court hearing to be held in public as tech giant appeals against UK government order to open a backdoor into its encrypted iCloud service Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
11 Mar 2025
UK government under-prepared for catastrophic cyber attack, hears PAC
The Commons Public Accounts Committee heard government IT leaders respond to recent National Audit Office findings that the government’s cyber resilience is under par Continue Reading
By- Brian McKenna, Enterprise Applications Editor
-
News
11 Mar 2025
Singapore IT leaders boost AI security defences
Study reveals a surge in perceived importance of artificial intelligence for cyber security in Singapore, but declining investment in traditional measures raises concerns as sophisticated cyber attacks intensify Continue Reading
By- Aaron Tan, TechTarget
-
E-Zine
11 Mar 2025
Digitally mapping the world
In this week’s Computer Weekly, we find out how digital twins are mapping our planet to guide strategic decisions such as environmental policies. Liverpool City Council explains how a digital overhaul will transform customer experience. And we find out what it takes to become a cyber security entrepreneur. Read the issue now. Continue Reading
-
News
10 Mar 2025
Peter Kyle sets stage for making tech work
During his speech at the Tech Policy conference, Kyle announced a number of initiatives to support AI and other new technologies Continue Reading
By- Cliff Saran, Managing Editor
-
News
10 Mar 2025
How CISOs are tackling cyber security challenges
Security chiefs at the recent Gartner Security and Risk Management Summit in Sydney share insights on navigating board communication, organisational resilience and the importance of understanding business needs Continue Reading
-
News
07 Mar 2025
Managing security in the AI age
Gartner experts offer guidance on harnessing AI’s power while mitigating its risks, from managing shadow AI to implementing security controls and policies Continue Reading
-
News
06 Mar 2025
UK cyber security damaged by ‘clumsy Home Office political censorship’
Britain’s National Cyber Security Centre secretly censors computer security guidance and drops references to encryption Continue Reading
By- Duncan Campbell , 2QQ Ltd, Sussex University
-
Feature
06 Mar 2025
Norway says ‘no way’ to global financial crime
Oslo’s startup ecosystem is fighting back against cyber criminals with tech to wipe out attacks rather than just detect them Continue Reading
-
News
06 Mar 2025
Going beyond search: Elastic’s observability and security play
Elastic’s chief product officer Ken Exner talks up the company’s expansion into observability and security and how it balances innovation with community contributions and monetisation Continue Reading
By- Aaron Tan, TechTarget
-
News
05 Mar 2025
Apple IPT appeal against backdoor encryption order is test case for bigger targets
The Home Office decision to target Apple with an order requiring access to users’ encrypted data is widely seen as a ‘stalking horse’ for attacks against encrypted messaging services WhatsApp, Telegram and Signal Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
05 Mar 2025
NHS investigating how API flaw exposed patient data
NHS patient data was left vulnerable by a flaw in an application programming interface used at online healthcare provider Medefer Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
04 Mar 2025
Aussie businesses ramp up security spending
Australian organisations are set to spend A$6.2bn on security and risk management in 2025, a 14.4% jump from the previous year, driven by the rise of AI and a growing threat landscape Continue Reading
By- Aaron Tan, TechTarget
-
Definition
03 Mar 2025
What is cyberstalking and how to prevent it?
Cyberstalking is a crime in which someone harasses or stalks a victim using electronic or digital means, such as social media, email, instant messaging (IM) or messages posted to a discussion group or forum. Continue Reading
-
News
03 Mar 2025
Singapore’s HomeTeamNS hit by ransomware attack
The non-profit organisation suffered a ransomware attack that affected some servers containing employee and member data, prompting an investigation and enhanced security measures Continue Reading
By- Aaron Tan, TechTarget
-
News
01 Mar 2025
Ransomware: from REvil to Black Basta, what do we know about Tramp?
This key member of the Black Basta ransomware gang is wanted by the US justice system. He narrowly escaped extradition at the end of June 2024 - with the help of highly-placed contacts in Moscow, according to him Continue Reading
By- Valéry Rieß-Marchive, Rédacteur en chef
-
News
28 Feb 2025
France pushes for law enforcement access to Signal, WhatsApp and encrypted email
Proposals to be discussed in the French Parliament will require tech companies to hand over decrypted messages and email or face huge fines Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
28 Feb 2025
NHS staff lack confidence in health service cyber measures
NHS staff understand their role in protecting the health service from cyber threats and the public backs them in this aim, but legacy tech and a lack of training are hindering efforts, according to BT Continue Reading
By- Alex Scroxton, Security Editor
-
Definition
27 Feb 2025
What is domain generation algorithm (DGA)?
A domain generation algorithm (DGA) is a program that generates a large list of domain names. DGAs provide malware with new domains to evade security countermeasures. Continue Reading
By- Nick Barney, Technology Writer
- Alexander S. Gillis, Technical Writer and Editor
- Sharon Shea, Executive Editor
-
News
26 Feb 2025
US intelligence chief Tulsi Gabbard probes UK demand for Apple’s encrypted data
A secret order issued by the UK against Apple would be a ‘clear and egregious violation’ if it provides back door access to Americans’ encrypted data, says US director of national intelligence Continue Reading
By- Bill Goodwin, Computer Weekly
-
Opinion
25 Feb 2025
Reflecting on three years of cyber warfare in Ukraine
With the third anniversary of Russia's illegal invasion of Ukraine passing this week, Charl Van Der Walt reflects on how the cyber threat landscape in Europe has changed since 2022 Continue Reading
By- Charl Van Der Walt, Orange Cyberdefense
-
E-Zine
25 Feb 2025
Rethinking the route to net zero
In this week’s Computer Weekly, our latest buyer’s guide looks at the need to apply innovative and long-term thinking to reducing carbon emissions in IT. We find out how retailer Dunelm is benefiting from a programme to attract, retain and support women in tech. And Volvo Cars explains why the future for its vehicles is software-defined. Read the issue now. Continue Reading
-
News
25 Feb 2025
Ransomware: on the murky trail of one of the leaders of Black Basta
The internal exchanges within the Black Basta group revealed last week offer a new opportunity to investigate one of its leaders: Tramp. He may have been arrested in Armenia in June 2024, before being released Continue Reading
By- Valéry Rieß-Marchive, Rédacteur en chef
-
News
24 Feb 2025
European Union calls for more cyber data-sharing with Nato
Updates to the EU’s Cyber Blueprint, establishing best practice for multilateral security incident response in Europe, include calls for more collaboration with Nato member states, as the geopolitical environment becomes ever more fractious Continue Reading
By- Alex Scroxton, Security Editor
-
News
23 Feb 2025
Check Point co-founder on AI, quantum and independence
Gil Shwed, Check Point’s co-founder and executive chairman, discusses the company’s focus on artificial intelligence-driven security and his commitment to remaining an independent force in the cyber security market Continue Reading
By- Aaron Tan, TechTarget
-
News
21 Feb 2025
A landscape forever altered? The LockBit takedown one year on
The NCA-led takedown of the LockBit ransomware gang in February 2024 heralded a transformative year in the fight against cyber crime. One year on, we look back at Operation Cronos and its impact Continue Reading
By- Alex Scroxton, Security Editor
-
News
20 Feb 2025
Watchdog approves Sellafield physical security, but warns about cyber
The Office for Nuclear Regulation has taken Sellafield out of special measures for physical security, but harbours cyber security concerns Continue Reading
By- Brian McKenna, Enterprise Applications Editor
-
E-Zine
20 Feb 2025
CW APAC – Trend Watch: CIO trends 2025
It will be no surprise to see artificial intelligence high on the agenda for 2025. In this handbook, focused on CIO trends in the Asia-Pacific region, Computer Weekly looks at how banks are navigating technology, the continued importance of cyber security, and how enterprises can cement their AI future. Continue Reading
-
News
19 Feb 2025
Warning over privacy of encrypted messages as Russia targets Signal Messenger
Russia is using phishing attacks to compromise encrypted Signal Messenger services used by targets in the Ukraine. Experts warn that other encrypted app users are at risk Continue Reading
By- Bill Goodwin, Computer Weekly
-
Definition
18 Feb 2025
What are social engineering attacks?
Social engineering is an attack vector that relies heavily on human interaction and often involves psychological manipulation of people into breaking normal security procedures and best practices to gain unauthorized access. Continue Reading
By- Paul Kirvan
- Madelyn Bacon, TechTarget
-
News
18 Feb 2025
MSP cuts costs with Scality pay-as-you-go anti-ransomware storage
Autodata gets Scality as-a-service for on-site immutable storage via Artesca, to allow customers to rapidly recover from ransomware and at the same cost per terabyte no matter the volume Continue Reading
By- Antony Adshead, Storage Editor
-
News
18 Feb 2025
CPX 2025: Check Point CEO talks up hybrid mesh security
At CPX 2025 in Bangkok, Check Point CEO Nadav Zafrir outlined a vision for network security centred on hybrid mesh architecture and AI-powered capabilities Continue Reading
By- Aaron Tan, TechTarget
-
News
17 Feb 2025
The Security Interviews: Yevgeny Dibrov, Armis
Armis CEO Yevgeny Dibrov talks about how his military service and intelligence work opened the door into the world of cyber security entrepreneurship Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
16 Feb 2025
How to get employees to take cyber risk more seriously
To combat risky cyber security behaviour, organisations must move beyond awareness training and cultivate a culture where security violations are personally felt and socially unacceptable, leveraging existing values, real-world impacts, and even humour Continue Reading
By- Leigh McMullen
-
News
14 Feb 2025
Lenovo CSO: AI adoption fuels security paranoia
Doug Fisher, Lenovo’s chief security officer, outlines the company’s approach to security and AI governance, and the importance of having a strong security culture to combat cyber threats amplified by the use of AI Continue Reading
By- Aaron Tan, TechTarget
-
News
14 Feb 2025
Government renames AI Safety Institute and teams up with Anthropic
Addressing the Munich Security Conference, UK government technology secretary Peter Kyle announces a change to the name of the AI Safety Institute and a tie-up with AI company Anthropic Continue Reading
By- Brian McKenna, Enterprise Applications Editor
-
News
14 Feb 2025
Top cryptography experts join calls for UK to drop plans to snoop on Apple’s encrypted data
Some of the world’s leading computer science experts have signed an open letter calling for home secretary Yvette Cooper to drop a controversial secret order to require Apple to provide access to people’s encrypted data Continue Reading
By- Bill Goodwin, Computer Weekly