IT security
-
Feature
22 Apr 2024
Securing the edge: A new battleground in mobile network security
Edge computing is now a reality that’s reshaping industries and transforming approaches to mobile network infrastructure, but failure to secure it can expose networks and data to cyber threats. Learn more about some of the dangers and potential solutions Continue Reading
-
News
22 Apr 2024
Former Sellafield consultant claims the nuclear complex tampered with evidence
Whistleblower Alison McDermott claims former employer Sellafield tampered with metadata in letters used in evidence during an employment tribunal Continue Reading
-
News
08 Oct 2021
Fast-moving Ryuk campaign targets healthcare organisations
Newly designated FIN12 gang leverages the work of the cyber criminal ecosystem to conduct lightning-fast ransomware attacks Continue Reading
-
News
08 Oct 2021
NatWest admits to weaknesses in anti-money laundering systems
Bank pleads guilty to failures concerning the laundering of hundreds of millions of pounds, but says it has since improved its anti-money laundering systems Continue Reading
-
Opinion
07 Oct 2021
Addressing the backup dilemma to ransomware recovery
Everyone knows good backups are essential if one is to recover from a ransomware attack, but using them effectively poses challenges that IT teams need to know about Continue Reading
-
News
07 Oct 2021
ICO expresses concerns over its future independence
In its response to the government’s data protection consultation, the Information Commissioner’s Office has raised worries over its future ability to function independently of government interference Continue Reading
-
Definition
07 Oct 2021
next-generation firewall (NGFW)
A next-generation firewall (NGFW) is part of the third generation of firewall technology that can be implemented in hardware or software. Continue Reading
-
News
07 Oct 2021
Uber faces legal action over ‘racist’ facial verification system
Two UK-based unions are taking Uber to court, claiming their members have been unfairly dismissed as a result of misidentification by the company’s facial verification system Continue Reading
-
News
07 Oct 2021
Twitch data breach investigations continue
Investigations are ongoing into a 125GB data breach that hit livestreaming platform Twitch, apparently the work of hacktivists Continue Reading
-
E-Zine
07 Oct 2021
CW Middle East: Middle East hospitals accelerate take-up of healthcare technologies
The Middle East is accelerating its take-up of digital healthcare technologies following lessons learned during the Covid-19 pandemic, with regional government turning to technology to track disease trends and monitor treatment. Also read in this issue how the UAE’s National Program for Coders will offer ‘golden visas’ to 100,000 entrepreneurs, enterprise owners and startups. Continue Reading
-
News
06 Oct 2021
US lawmakers propose ransomware reporting rules
Former presidential candidate Elizabeth Warren lends her support to a bill that would require corporate ransomware victims to disclose more information about their attacks to the authorities Continue Reading
-
Opinion
06 Oct 2021
Security Think Tank: Responsible vulnerability disclosure is a joint effort
By working hand-in-hand, developers and security researchers can both play a vital role in ensuring newly-discovered vulnerabilities are addressed appropriately, writes Paddy Francis of Airbus CyberSecurity Continue Reading
-
News
06 Oct 2021
Gaming service Twitch hacked, data leaked
Users of livestreaming platform Twitch may be at risk after a 125GB torrent of data was leaked Continue Reading
-
News
06 Oct 2021
Apache web server users urged to patch immediately
New zero-day in Apache HTTP Server is already being actively exploited and must be addressed immediately Continue Reading
-
News
06 Oct 2021
Auto-enrolment begins for Google multi-factor authentication
Google has started to turn on multi-factor authentication on consumer accounts by default, and aims to auto-enrol 150 million users by the end of 2021 Continue Reading
-
Podcast
06 Oct 2021
Top women in UK tech, AI on puffin island – Computer Weekly Downtime Upload podcast
In this episode, Caroline Donnelly, Clare McDonald and Brian McKenna discuss CW’s annual programme to choose the most influential women in UK tech, as well as Newham Sparks, and puffin-counting AI Continue Reading
-
News
06 Oct 2021
Israeli Orca to invest in UK cyber scene
Tel Aviv-headquartered Orca Security wants to set up a new R&D centre in the UK Continue Reading
-
Opinion
05 Oct 2021
New strategies needed to close the cyber security skills gap
Teaching cyber security in schools is a long-term solution to a present-day problem Continue Reading
-
News
05 Oct 2021
New Python-based ransomware attacks unfold in record time
Sophos researchers detail a new variety of Python-based ransomware attack targeting VMware ESXi-hosted VMs Continue Reading
-
Opinion
05 Oct 2021
Invest in cyber security with confidence using a structured approach
Cyber security has never been more challenging or important in rapidly changing business, regulatory, IT and threat environments. There is a need for a more structured approach to investment Continue Reading
-
Definition
05 Oct 2021
Layer Two Tunneling Protocol (L2TP)
Layer Two Tunneling Protocol (L2TP) is an extension of the Point-to-Point Tunneling Protocol (PPTP) used by an internet service provider (ISP) to enable the operation of a virtual private network (VPN) over the internet. Continue Reading
-
Opinion
05 Oct 2021
Keeping the UK in the global race to adopt digital identity
The UK government’s proposed digital ID trust framework is a step in the right direction, but more is needed to ensure the successful adoption of digital identity across the economy Continue Reading
-
Opinion
05 Oct 2021
ICO cookie consent: How will the plan affect businesses?
A data privacy and compliance expert considers what the ICO’s proposals for an overhaul of cookie consent procedures could mean for businesses Continue Reading
-
News
05 Oct 2021
Facebook unplugged for six hours due to configuration error
A configuration change effectively disconnected Facebook from the internet, with billions affected by loss of services Continue Reading
-
News
05 Oct 2021
Australian organisations lack maturity in responsible AI
Most Australian organisations are still in the early stages of their responsible artificial intelligence efforts despite growing use of AI by businesses and consumers, study finds Continue Reading
-
News
04 Oct 2021
Mandiant name returns to fore ahead of FireEye sale
Mandiant has completed its corporate rebrand pending the imminent sale of the FireEye products business to a private equity group Continue Reading
-
News
04 Oct 2021
One Identity buys OneLogin for access management expertise
Acquisition of OneLogin adds access management solutions to One Identity’s Unified Identity Security platform Continue Reading
-
News
04 Oct 2021
Two arrests made in European ransomware investigation
Unnamed ransomware operation was disrupted last week in Kiev, Ukraine, following a coordinated investigation Continue Reading
-
Opinion
04 Oct 2021
Security Think Tank: Embracing vulnerability management for the greater good
When it comes to vulnerability management, CISOs should define a responsible disclosure policy so that they can receive and manage identified vulnerabilities transparently, practically and collaboratively, says Paul Watts of the ISF Continue Reading
-
News
04 Oct 2021
How GYG Singapore moved to paperless contracts
The Singapore franchisee of Mexican cuisine specialist Guzman y Gomez has turned to electronic agreements and digital signatures to ease the administrative burden on its HR team Continue Reading
-
News
01 Oct 2021
Met Police purchase new retrospective facial-recognition system
Retrospective facial-recognition software purchased for £3m by the Met Police will be deployed in coming months amid continuing controversy around the use of biometric technologies by law enforcement bodies Continue Reading
-
News
01 Oct 2021
Amnesty International exploited in malware campaign
According to new intelligence from Cisco Talos, Amnesty International’s branding and profile is being used as part of a new malware campaign that exploits people’s fears of the notorious Pegasus spyware app Continue Reading
-
News
01 Oct 2021
JVCKenwood hit by Conti ransomware attack
Nearly 2TB of data was stolen from Japanese electronics firm in a Conti ransomware hit Continue Reading
-
News
01 Oct 2021
IR35: Giant Group cyber attack prompts renewed calls for statutory regulation of umbrella companies
As details about the fallout from the cyber attack on the Giant Group umbrella company emerge, stakeholders say the incident should prompt the government to expedite regulating contractor payroll processing firms Continue Reading
-
News
30 Sep 2021
Team leaders urged to address developer mental health
The pandemic led to many developers working from home, and many have experienced burnout Continue Reading
-
News
30 Sep 2021
UK consumers would collectively pay over £1bn a year for control of their data
UK consumers are willing to pay a small fee per month to have control of the data they share with Google and Facebook Continue Reading
-
News
30 Sep 2021
NUS and Thales to develop quantum technologies
The National University of Singapore and Thales have joined hands to test quantum technologies for commercial applications in security and sensing Continue Reading
-
Definition
30 Sep 2021
Secure Electronic Transaction (SET)
Secure Electronic Transaction (SET) is a system and electronic protocol to ensure the integrity and security of transactions conducted over the internet. Continue Reading
-
News
29 Sep 2021
Russia arrests prominent cyber security executive
Founder and CEO of cyber security firm Group-IB detained in Moscow on treason charges Continue Reading
-
News
29 Sep 2021
FoggyWeb malware latest tool of dangerous Nobelium APT
Microsoft’s threat intelligence team warns of a new strain of malware being used by the Russia-linked Nobelium APT Continue Reading
-
News
29 Sep 2021
Security boost in Windows 11 limits PC reuse
Microsoft has put a lot of emphasis on improving security in Windows 11, but this comes at a cost as old hardware is no longer supported Continue Reading
-
News
29 Sep 2021
Dedicated number for victims of fraud launched amid national security threat
Consumers that suspect they are being targeted by fraudsters can call 159 to be directly linked to their bank, as part of a 12-month pilot Continue Reading
-
News
29 Sep 2021
The Security Interviews: How SolarWinds came through its darkest hour
In his first major UK press interview, SolarWinds CEO Sudhakar Ramakrishna tells Computer Weekly how a relentless focus on transparency saw the company safely through a nightmare cyber breach scenario Continue Reading
-
News
29 Sep 2021
UK consumer trust in banks, retailers and telcos declines as scams increase
Consumers are blaming banks, retailers and social media for the huge increase in online scams, survey shows Continue Reading
-
News
28 Sep 2021
Digital regulators need discrete but cooperative remits
The UK’s information commissioner has told MPs that digital economy regulators need discrete remits backed up by strong information sharing powers to both provide clear focus as well as allow for greater cooperation between their disparate but interlinked regimes Continue Reading
-
News
28 Sep 2021
How one red team exercise averted a new SolarWinds-style attack
Palo Alto Networks shares details of how its red teamers found and sealed a customer vulnerability that could have led to another SolarWinds-style supply chain attack Continue Reading
-
News
27 Sep 2021
Uber drivers strike over pay issues and unfair dismissal claims
Unionised Uber drivers take industrial action in response to ongoing disputes over pay and claims that drivers are being unfairly dismissed as a result of the company’s technologies Continue Reading
-
News
27 Sep 2021
Women and BAME people bear brunt of cyber crime impact
Cyber crime has a disproportionate impact on women and BAME people, according to a new report Continue Reading
-
News
27 Sep 2021
Giant Umbrella contractors suffer salary payment delays following suspected ‘data breach’
Following the discovery of “suspicious network activity” in its systems, payroll processing firm Giant Umbrella has taken itself offline, leaving contractors to fume over missing salary payments Continue Reading
-
Definition
27 Sep 2021
brute-force attack
A brute-force attack is a trial-and-error method used by application programs to decode login information and encryption keys to use them to gain unauthorized access to systems. Continue Reading
-
News
27 Sep 2021
Dubai International Finance Centre’s data protection law to be boosted by new federal regulation
New UAE data protection regulation on the horizon a year after a Dubai-specific law came into force Continue Reading
-
News
26 Sep 2021
What it takes to attract and retain women in cyber security
The narrowing gender gap may be a cause for cheer, but more needs to be done to curb discrimination, and attract and retain women for cyber security roles in Asia-Pacific Continue Reading
-
Video
24 Sep 2021
Empowering APAC women on the frontlines of cyber security
In this webinar, we discuss the issues facing women in cyber security, the challenges of breaking into the field and why it’s important to close the gender gap Continue Reading
-
Opinion
24 Sep 2021
Facial recognition cannot be a standalone authentication method
As more organisations look to facial recognition to improve their digital identity practices, they must remember that it cannot stand in isolation Continue Reading
-
News
24 Sep 2021
How Australia punches above its weight in cyber security
Australia is playing to its strengths in niche areas such as governance and deep tech to punch above its weight in the cyber security industry Continue Reading
-
News
23 Sep 2021
Fresh alert over Conti ransomware surge
Conti ransomware crew appears increasingly active, prompting fresh warnings from the US authorities Continue Reading
-
News
23 Sep 2021
MoD in second leak of Afghan citizens’ data
A second breach of data relating to Afghan citizens at risk of Taliban reprisals has been reported by the Ministry of Defence Continue Reading
-
News
23 Sep 2021
Threat actors target VMware vCenter Server users
Users of VMware vCenter Server are advised to patch a series of vulnerabilities post haste Continue Reading
-
News
23 Sep 2021
Authorised push payment fraud sees huge increase as criminals switch tactics
Criminals tricking people into making payments through channels such as fake emails and websites have stolen more money than payment card fraudsters Continue Reading
-
Blog Post
22 Sep 2021
Please protect us from our own stupidity
It seems like the simplest thing. Compose an email message and then CC colleagues. But,due to a Ministry of Defence blunder, this simple action, built into pretty much every piece of email client ... Continue Reading
-
News
22 Sep 2021
AI cannot be regulated by technical measures alone
The regulation of artificial intelligence must address the power of tech companies, as technical measures alone will not be enough to prevent the harms caused by AI-driven technologies, says report Continue Reading
-
Opinion
22 Sep 2021
UK data plans aim to boost growth but will they isolate the UK from its international friends?
The UK government has made strong statements about the nation’s post-Brexit data strategy but must be careful not to undermine its global credibility Continue Reading
-
News
22 Sep 2021
UK government turns to Tim Berners-Lee startup for digital identity plan
As part of its new digital identity project, the Government Digital Service is using the Solid platform created by web inventor Berners-Lee, which helps users to manage their personal data better Continue Reading
-
Opinion
21 Sep 2021
Managing cyber risk through integrated supply chains
High-profile supply chain cyber attacks have caused huge disruption this year. PA Consulting’s Carl Nightingale considers key questions business leaders should be asking of their organisations Continue Reading
-
News
21 Sep 2021
US sanctions Suex crypto exchange over ransomware links
US Treasury cracks down on cryptocurrency exchange that supposedly facilitated proceeds from multiple ransomware gangs Continue Reading
-
News
21 Sep 2021
Investigation launched after MoD email blunder
Exposure of PII on Afghan interpreters who worked with the UK may put hundreds at risk of Taliban reprisals Continue Reading
-
Definition
21 Sep 2021
key fob
A key fob is a small, programmable device that provides access to a physical object. Continue Reading
-
News
21 Sep 2021
Spanish police bust Mafia-linked phishing gang
A joint operation between European authorities has dismantled a cyber criminal gang with links to the Italian Mafia Continue Reading
-
News
21 Sep 2021
BlackMatter gang ramps up attacks on multiple victims
A wave of new BlackMatter ransomware attacks is hitting organisations around the world, even as the US authorities mull new sanctions on ransom payment infrastructure Continue Reading
-
21 Sep 2021
UK GDPR faces changes under planned reforms
DCMS is launching a major consultation on proposed changes to the UK’s data protection regime, under which several key elements of the GDPR are likely to change Continue Reading
-
E-Zine
21 Sep 2021
The cities planning for ethical use of AI
In this week’s Computer Weekly, we talk to tech leaders in Barcelona and London about a collaboration to ensure ethical use of AI in the era of smart cities. The UK government wants to reform data protection law – we assess the implications. And we examine the latest best practice in hybrid cloud. Read the issue now. Continue Reading
-
Definition
20 Sep 2021
runbook
Runbooks are a set of standardized written procedures for completing repetitive IT processes within a company. Continue Reading
-
Definition
17 Sep 2021
email spam
Email spam, also known as junk email, refers to unsolicited email messages, usually sent in bulk to a large list of recipients. Continue Reading
-
Definition
17 Sep 2021
security policy
A security policy is a document that states in writing how a company plans to protect its physical and information technology (IT) assets. Continue Reading
-
Blog Post
17 Sep 2021
Do we really want a single digital identity system to access government services?
Is the UK government about to make a new announcement on its plans for a single digital identity for citizens to access online public services? On 22 September, two seemingly coordinated ... Continue Reading
-
News
16 Sep 2021
Dutch education administrators underestimate threat of cyber crime
Research shows educational establishments in the Netherlands are becoming favoured targets of cyber criminals and administrators are underestimating the risks Continue Reading
-
News
16 Sep 2021
Bitdefender launches free REvil ransomware decryptor
Working alongside law enforcement partners, Bitdefender has developed and released a tool to help REvil victims recover their data for free Continue Reading
-
Definition
16 Sep 2021
shadow password file
A shadow password file, also known as /etc/shadow, is a system file in Linux that stores encrypted user passwords and is accessible only to the root user, preventing unauthorized users or malicious actors from breaking into the system. Continue Reading
-
Blog Post
16 Sep 2021
The UK government data protection reforms - good for business, but are they good for you?
This is a guest post by Computer Weekly security editor Alex Scroxton, which features in the 21 September issue of the Computer Weekly digital magazine as its leader column. It is hard to sum up ... Continue Reading
-
News
16 Sep 2021
European president outlines tech vision to drive Europe
President of the European Commission has set out plans for a stronger European economy, with less reliance on US and Chinese tech giants Continue Reading
-
News
16 Sep 2021
Travel-themed phishing lures spiked this summer
As people begin to take holidays again after more than a year of restrictions and lockdowns, opportunist cyber criminals have taken note, according to new data from Palo Alto’s Unit 42 Continue Reading
-
News
15 Sep 2021
Interview: Chancellor of the Exchequer Rishi Sunak on supporting the UK tech sector
Computer Weekly talked to Sunak at a Treasury event in front of an audience of tech sector leaders, investors and startups, to discuss how the government can support the digital economy Continue Reading
-
Definition
15 Sep 2021
Kerberos
Kerberos is a protocol for authenticating service requests between trusted hosts across an untrusted network, such as the internet. Continue Reading
-
News
15 Sep 2021
Microsoft patches 66 vulnerabilities in September update
Another lighter-than-usual Patch Tuesday update includes important fixes for recently disclosed vulnerabilities, including a dangerous zero-day, and an update in the PrintNightmare saga Continue Reading
-
News
15 Sep 2021
Australia and Singapore have higher incidences of insecure databases
Five-year longitudinal study by Imperva shows the proportion of databases with at least one known vulnerability in Australia and Singapore are among the world’s highest Continue Reading
-
News
14 Sep 2021
Mass health tracker data breach has UK impact
The leak of a database of 61 million users of health-tracking devices includes records on individuals located in the UK Continue Reading
-
News
14 Sep 2021
Cost of ransomware attack in financial sector exceeds $2m
Mid-sized financial services organisations worldwide spend an average of over $2m recovering from ransomware attacks Continue Reading
-
News
14 Sep 2021
Apple patches ForcedEntry vulnerability used by spyware firm NSO
Apple patches ForcedEntry vulnerability that was used to target political activists with spyware Continue Reading
-
News
14 Sep 2021
BT advances hollow core fibre research with world’s first trial of quantum-secure comms
Incumbent UK telco announces latest innovations in hollow core fibre by conducting trial of ultra-secure network communications using commercial equipment over a 6km long Lumenisity CoreSmart cable Continue Reading
-
E-Zine
14 Sep 2021
Is 3D printing about to hit the mainstream?
In this week’s Computer Weekly, we find out about the emerging consumer services using 3D printing and ask if the technology is about to go mainstream. Our latest buyer’s guide looks at the importance of sustainable datacentres. And we analyse the risks of increasing contactless card spending limits and whether tech could help. Read the issue now. Continue Reading
-
News
13 Sep 2021
Smishing attacks up sevenfold in six months
Scam text messages are reaching pandemic proportions, thanks in part to the pandemic Continue Reading
-
News
13 Sep 2021
Olympus likely victim of BlackMatter ransomware
Key IT systems remain shut off at Olympus, five days after what seems to have been a BlackMatter ransomware attack Continue Reading
-
Definition
13 Sep 2021
promiscuous mode
In computer networking, promiscuous mode is a mode of operation, as well as a security, monitoring and administration technique. Continue Reading
-
Definition
13 Sep 2021
deep packet inspection (DPI)
Deep packet inspection (DPI) is an advanced method of examining and managing network traffic. Continue Reading
-
News
13 Sep 2021
UK government’s new digital identity system to cost up to £400m
Cabinet Office is seeking £300m-£400m in funding to build its replacement for the failed Gov.uk Verify system, which itself cost over £220m Continue Reading
-
News
09 Sep 2021
UK GDPR faces changes under planned reforms
DCMS is launching a major consultation on proposed changes to the UK’s data protection regime, under which several key elements of the GDPR are likely to change Continue Reading
-
News
09 Sep 2021
Latest Microsoft zero-day being actively exploited
New Microsoft zero-day CVE-2021-40444 affects multiple versions of Windows and is probably being exploited through convincing phishing attacks Continue Reading
-
E-Zine
09 Sep 2021
CW Europe: Dutch researchers build security software to mimic human immune system
In this issue of CW Europe, find out how researchers in the Netherlands are attempting to help IT systems fight certain cyber attacks in a similar way to the human immune system works. One of the team at Dutch research institute TNO was originally an immunologist, and saw parallels with the human immune system in the field of cyber security. Also in this issue, find out about the so-called “Klarna academy” in Stockholm, which has created the next set of Nordic fintech entrepreneurs. Continue Reading
-
Blog Post
08 Sep 2021
Law enforcement: Question the tech sector's motives
Perhaps there are application areas where law enforcement technology should not be used, one of the witnesses at a recent Justice and Home Affairs Committee meeting warned. Experts from the US, New ... Continue Reading
- 08 Sep 2021
-
News
08 Sep 2021
REvil reappearance may herald new ransom campaigns
The re-emergence of the infamous REvil ransomware gang is a likely sign that more high-profile attacks will unfold over the coming weeks Continue Reading
-
News
08 Sep 2021
Covid positive for security market, but still a source of stress
CIISec’s latest “State of the profession report” highlights both positives and challenges for cyber pros arising from the past two years Continue Reading