IT security
-
News
25 Jul 2024
North Korean cyber APT targeting nuclear secrets
Mandiant has upgraded the North Korean threat actor known as Andariel to APT status and warned of coordinated efforts to steal western military IP, including nuclear secrets Continue Reading
-
Feature
25 Jul 2024
CrowdStrike update chaos explained: What you need to know
A botched software update at cyber security firm CrowdStrike has caused IT chaos around the world. Learn more about the global CrowdStrike update outage as it develops Continue Reading
-
News
22 Jun 2021
UK SMEs lack capacity to fend off cyber attacks
Three-quarters of UK SME leaders would not have sufficient capacity or expertise to deal with a cyber attack, according to a report Continue Reading
-
E-Zine
22 Jun 2021
A new three-year plan for digital government
In this week’s Computer Weekly, the new CEO of the Gov-ernment Digital Service, Tom Read, explains his three-year strategy for improving online public services. EU attempts to regulate AI are under fire – we examine the issues. And we find out how Bupa is turning to the cloud to deliver per-sonalised healthcare. Read the issue now. Continue Reading
-
News
21 Jun 2021
Parliamentary devices left in taxis, buses, trains and pubs
Nearly 100 devices belonging to parliamentary staffers, including MPs and peers, were lost or stolen over the course of 2019 and 2020 Continue Reading
-
Feature
21 Jun 2021
Best practices for secure printing
The reality of a paperless office remains some way off, so printers are here to stay for a while. But their increasingly connected status means securing them should be a priority Continue Reading
-
News
18 Jun 2021
NHS App reaches six million users, thanks to Covid vaccine feature
More than two million new users have downloaded the NHS App since it was updated in May to include Covid-19 vaccination status Continue Reading
-
Definition
18 Jun 2021
ping sweep (ICMP sweep)
A ping sweep (also known as an ICMP sweep) is a basic network scanning technique used to determine which of a range of IP addresses map to live hosts (computers). Continue Reading
-
News
18 Jun 2021
ICO issues guidance on facial recognition in public spaces
Information commissioner’s concern over the problematic use of facial recognition in public spaces has prompted her to publish official guidance on its deployment, while civil society calls for an outright ban Continue Reading
-
News
18 Jun 2021
Lorca Ignite programme targets breakout cyber talent
Six of the most successful companies to have come through Lorca’s existing accelerators are being inducted into an intensive programme Continue Reading
-
News
18 Jun 2021
Carnival Cruises hit by fourth cyber incident in a year
Latest data breach at Covid-hit cruise line comes hot on the heels of two recent ransomware attacks and a spring 2020 breach Continue Reading
-
Definition
17 Jun 2021
Gramm-Leach-Bliley Act (GLBA)
The Gramm-Leach-Bliley Act (GLB Act or GLBA), also known as the Financial Modernization Act of 1999, is a federal law enacted in the United States to control the ways financial institutions deal with the private information of individuals. Continue Reading
-
Definition
17 Jun 2021
OPSEC (operations security)
OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines what is required to protect sensitive information and prevent it from getting into the wrong hands. Continue Reading
-
News
17 Jun 2021
Cyber crooks target Amazon Prime users ahead of retail bonanza
A surge in malicious domain registrations ahead of Amazon Prime Day indicates cyber criminals have set their sights on exploiting vulnerable shoppers Continue Reading
-
News
17 Jun 2021
UnitingCare Queensland restores IT systems after cyber attack
Australian healthcare service provider has restored key corporate systems and integrations between applications following a cyber attack earlier this year Continue Reading
-
News
17 Jun 2021
Biden tackles Putin on ransomware at Geneva summit
Discussions between Joe Biden and Vladimir Putin on cyber crime appear to have been somewhat positive, but the path ahead remains unclear Continue Reading
-
News
16 Jun 2021
Cl0p ransomware gang clapped in irons, assets seized
Ukrainian police report they have taken down the Cl0p, aka Clop, ransomware operation following a lengthy investigation Continue Reading
-
News
16 Jun 2021
Organisations cannot rely on cyber insurance to cover losses
Ransomware attacks have become a big driver of cyber insurance claims, but insurance must not be relied upon as a failsafe, says a report Continue Reading
-
News
15 Jun 2021
NHS Test and Trace picks Risk Ledger to secure supply chain
Risk Ledger’s technology promises ‘unparalleled’ visibility into NHS Test and Trace’s supply chain Continue Reading
-
News
15 Jun 2021
Privacy pro salaries rise throughout pandemic, but at a cost
Data from the IAPP’s latest salary survey reveals some insight into how the pandemic impacted the privacy profession Continue Reading
-
News
15 Jun 2021
Ransomware most insidious cyber threat facing UK
NCSC CEO urges organisations to do more to prepare for ransomware attacks Continue Reading
-
News
15 Jun 2021
The Security Interviews: How to build a government model to ‘hack for good’
Kyle Hanslovan started Huntress to give back after a career in the intelligence sector. After US authorities took action to help people hit by the Microsoft Exchange attacks, we discussed how governments can ‘hack for good’ Continue Reading
-
News
15 Jun 2021
Scottish government awards digital identity platform contract to Scott Logic
Supplier is working on a two-year project to create a digital identity service through a suite of common platforms that will be adopted across Scottish government Continue Reading
-
News
15 Jun 2021
How healthcare organisations are tapping data analytics
Healthcare providers are harnessing data analytics to improve clinical and operational outcomes even as they continue to face challenges in data aggregation and data protection Continue Reading
-
News
14 Jun 2021
G7 commits to action on ransomware, digital privacy
The G7 urges Russia to do more to hold criminal ransomware gangs operating from within its borders to account as it commits to more action on the issue Continue Reading
-
Feature
14 Jun 2021
Europe’s proposed AI regulation falls short on protecting rights
The European Commission’s proposal for artificial intelligence regulation focuses on creating a risk-based, market-led approach replete with self-assessments, transparency procedures and technical standards, but critics warn it falls short of being able to protect people’s fundamental rights and mitigating the technology’s worst abuses Continue Reading
-
News
14 Jun 2021
HammondCare takes procurement to the cloud
The Australian health and aged care provider migrated its procurement and invoicing systems to the cloud in just six months to improve efficiency and security Continue Reading
-
News
11 Jun 2021
FBI planned a sting against An0m cryptophone users over drinks with Australian investigators
Australian Federal Police and the FBI came up with the idea over drinks: build a cryptophone network with a built-in backdoor and sell it to crime gangs around the world Continue Reading
-
News
11 Jun 2021
CMA secures commitments from Google on future of cookies
The Competition and Markets Authority is opening a consultation on commitments offered to it by Google to ensure its Privacy Sandbox proposals do not harm digital advertising markets Continue Reading
-
Opinion
11 Jun 2021
Security Think Tank: To secure printers think process, technology and people
Though rarely discussed in a cyber context, the prevalence of connected printers and MFPs poses security risks both technological and physical. What does a print security strategy need to take into account? Continue Reading
-
News
11 Jun 2021
UK promises tougher line on cyber crime
Speaking ahead of the G7 Summit, foreign secretary Dominic Raab says the UK is ready to take on cyber criminals and other malicious actors wherever they may be Continue Reading
-
News
11 Jun 2021
Australia names ‘strategic’ datacentre operators
Australia’s Digital Transformation Agency certifies Macquarie Telecom, Canberra Data Centres and Australian Data Centres as strategic operators for hosting government data Continue Reading
-
Feature
10 Jun 2021
How the pandemic changed backup
The Covid-19 pandemic forced big changes in how people work – we look at impacts on backup, including increased reliance on the cloud, plus security and compliance vulnerabilities and ransomware Continue Reading
-
News
10 Jun 2021
Risk data shows UK energy sector most vulnerable to cyber attack
New report compiled by insurance firm Hiscox reveals the state of cyber preparedness in the UK and beyond Continue Reading
-
E-Zine
10 Jun 2021
CW Europe: Amsterdam reins back datacentre developments over environmental concern
The construction of datacentres in the Netherlands’ Amsterdam region has accelerated at such a pace that their demands for electricity are causing concern, prompting city authorities and datacentre operators to open a dialogue about sustainable datacentre industry expansion. Also in this issue, find out the state of play in the adoption of open banking across Europe. Continue Reading
-
Opinion
10 Jun 2021
Security Think Tank: Time to accept printers will leak data
Though rarely discussed in a cyber context, the prevalence of connected printers and MFPs poses security risks both technological and physical. What does a print security strategy need to take into account? Continue Reading
-
News
10 Jun 2021
Australian organisations face heightened cyber attacks
Nearly three in four Australian organisations experienced cyber attacks that largely resulted from a growing remote workforce in 2020 Continue Reading
-
News
09 Jun 2021
FBI arrests distributors accused of selling An0m encrypted phones to crime groups
Working with overseas law enforcement, the FBI has arrested eight people and named a further 13 accused of distributing An0m phones to organised crime groups Continue Reading
-
News
09 Jun 2021
Unit 42 warns of emergent Prometheus ransomware
Palo Alto’s Unit 42 shares intel on the emergent Prometheus ransomware gang, with apparent links to the Thanos crew Continue Reading
-
News
09 Jun 2021
RSA spins out fraud and risk unit as Outseer
RSA Security is transitioning its fraud and risk intelligence work into a new business to be called Outseer Continue Reading
-
Opinion
09 Jun 2021
Why agility is the key to secure software
Continuous delivery of software product releases demands continuous security. Businesses and regulators are right to wonder whether organisations are valuing cyber security by the design of their products Continue Reading
-
News
09 Jun 2021
Microsoft fixes seven zero-days on its Patch Tuesday rounds
Fixes for six actively-exploited – and one yet-to-be-exploited – zero-day bugs are released in the June 2021 Patch Tuesday update Continue Reading
-
News
09 Jun 2021
Colonial Pipeline ransom seizure is a win, but don’t relax yet
The security community is enthusiastic about the US authorities’ recovery of a significant part of the Colonial Pipeline ransomware payment, but this positivity should perhaps be somewhat tempered Continue Reading
-
Definition
08 Jun 2021
threat intelligence (cyber threat intelligence)
Threat intelligence, also known as cyber threat intelligence (CTI), is information collected from various sources about current or potential attacks that threaten an organization. Continue Reading
-
News
08 Jun 2021
NHS Digital delays data collection plans until September
NHS Digital has postponed its proposed collection of GP data for two months, to allow more time for the public to understand the process and opt out if wanted Continue Reading
-
News
08 Jun 2021
We Open Tech community supports non-binary and trans security pros
New tech community established to advocate for the interests of non-binary people, trans and cis women, trans men, and other marginalised genders in security Continue Reading
-
Feature
08 Jun 2021
How cloud adoption is shaping digital identity trends in 2021
Expert Carla Roncato explains what organizations need to know about emerging digital identity and security trends for the cloud, including CASB, CIEM and zero trust. Continue Reading
-
News
08 Jun 2021
National data guardian calls for dialogue on NHS Digital GP plans
The UK’s national data guardian says it is important the public has clarity on how their confidential medical information will be used and kept secure under NHS data-sharing plans Continue Reading
-
Feature
08 Jun 2021
The rise and rise of supply chain attacks
Supply chain attacks in Asia-Pacific and elsewhere have intensified as cyber threat actors look to exploit the weakest links in business and digital supply chains Continue Reading
-
E-Zine
08 Jun 2021
The jobseekers turning to cyber crime in the pandemic
In this week’s Computer Weekly, security researchers say people left unemployed by the pandemic are turning to cyber crime – we find out why. We examine the confluence of distributed cloud and edge computing technologies. And controversial uses of facial recognition technology come under further scrutiny. Read the issue now. Continue Reading
-
08 Jun 2021
NGOs file complaints against Clearview AI in five countries
Privacy and human rights organisations have asked data protection regulators in the UK, France, Austria, Italy and Greece to investigate controversial facial recognition company Clearview AI Continue Reading
-
08 Jun 2021
Why some jobseekers have turned to cyber crime during the pandemic
Research shows that many people have been seeking cyber crime-related work on the dark web, but why? Continue Reading
-
News
07 Jun 2021
Police raids around world after investigators crack An0m cryptophone app in major hacking operation
Police in 16 countries carried out raids on after Australian Police and the FBI cracked an encrypted An0M communications network used by crime groups Continue Reading
-
Opinion
07 Jun 2021
Security Think Tank: What must a secure print strategy take into account?
Though rarely discussed in a cyber context, the prevalence of connected printers and MFPs poses security risks both technological and physical. What does a print security strategy need to take into account? Continue Reading
-
News
07 Jun 2021
EU privacy chief investigates use of US cloud services
Use of Amazon and Microsoft’s cloud services by public sector bodies in the European Union is being scrutinised by the bloc’s privacy watchdog Continue Reading
-
News
07 Jun 2021
Siloscape malware a risk to Windows containers, Kubernetes
Palo Alto’s Unit 42 reports on what appears to be the first-recorded malware targeting Kubernetes clusters through Windows containers Continue Reading
-
News
07 Jun 2021
NCSC updates schools ransomware guidance amid surge
The National Cyber Security Centre says it is dealing with a renewed surge of ransomware attacks targeting schools, colleges and universities Continue Reading
-
News
07 Jun 2021
IBM pushes back against US government data requests
Technology giant IBM says the US government has ‘no jurisdiction’ to request data from its European entities Continue Reading
-
News
07 Jun 2021
Campaigners plan legal action over NHS data sharing
Privacy coalition aims to force NHS Digital to push back its plans to scrape medical information on millions of patients into a central database Continue Reading
-
Opinion
07 Jun 2021
NHS Digital’s GP data-scraping plan must be publicised and delayed
The UK government must launch a national awareness campaign and delay this month’s planned GP data slurp, say privacy consultants Ben Rapp and Sara Newman Continue Reading
-
News
07 Jun 2021
Updated standard contractual clauses will provide ‘legal certainty’ for transfer of data
Organisations have 18 months to update data transfer agreements, known as standard contractual clauses, or SCCs, to continue sharing data outside the European Union Continue Reading
-
News
07 Jun 2021
DNS attacks on the rise in APAC
Attacks on the domain name system in Asia-Pacific grew by 15% last year, with Malaysian organisations seeing the sharpest rise in damages among countries in the region Continue Reading
-
Blog Post
04 Jun 2021
Towards Joined Up Action on On-line Harms, Fraud and Cybersecurity
We have to join up the debate and put cybersecurity into business, economic and social context. Hence the importance of the Digital Policy Alliance and its groups. Continue Reading
-
News
04 Jun 2021
HSBC offers all businesses scam awareness app
HSBC is sharing information on the latest scams and how to defend against them thorough its latest app, available to all businesses Continue Reading
-
Opinion
04 Jun 2021
Security Think Tank: Printers can’t be an ‘add-on’ in your cyber strategy
Though rarely discussed in a cyber context, the prevalence of connected printers and MFPs does pose security risks both technological and physical. What does a print security strategy need to take into account? Continue Reading
-
News
04 Jun 2021
BCS: Lack of communication over NHS GPDPR ‘astonishing’
The Chartered Institute for IT has warned that millions of people are not being properly informed of NHS Digital plans to harvest their data Continue Reading
-
News
04 Jun 2021
Secrecy around EncroChat cryptophone hack breaches French constitution, court hears
French lawyers claim that investigators are unlawfully withholding details of a cryptophone hacking operation in a case that could impact UK prosecutions Continue Reading
-
News
04 Jun 2021
Government action on ransomware epidemic gathers pace
The US government steps up action against ransomware operators, while the UK’s NCSC publishes guidance on preparing to deal with a ransomware attack Continue Reading
-
News
03 Jun 2021
Reports raise alarm over Huawei access to Dutch networks
Espionage accusations raise security questions for Netherlands organisations using Chinese supplier’s equipment and services Continue Reading
-
Definition
03 Jun 2021
social engineering
Social engineering is an attack vector that relies heavily on human interaction and often involves manipulating people into breaking normal security procedures and best practices to gain unauthorized access to systems, networks or physical locations or for financial gain. Continue Reading
-
Definition
03 Jun 2021
distributed denial-of-service (DDoS) attack
A distributed denial-of-service (DDoS) attack is one in which multiple compromised computer systems attack a target, such as a server, website or other network resource, and cause a denial of service for users of the targeted resource. Continue Reading
-
News
03 Jun 2021
Norway’s auditor general lifts lid on energy industry’s cyber security risks
Auditor General’s Office questions the security posture of Norway’s energy industry Continue Reading
-
News
03 Jun 2021
Tories fined over email data protection breaches
The Conservative Party broke the law by failing to properly keep records of who had unsubscribed from its mailing list Continue Reading
-
News
03 Jun 2021
FireEye sold to private equity, Mandiant regains independence
FireEye has agreed to sell its products business and name to a private equity consortium, while Mandiant will spin out as an independent threat intel business Continue Reading
-
News
03 Jun 2021
Pandemic a ‘once-in-a-lifetime’ chance to reshape security
The volume of remote working has made it hard to paint an accurate picture of the true state of enterprise cyber security, but it presents an opportunity to change things up Continue Reading
-
News
02 Jun 2021
Scottish businesses missing out on Cyber Essentials benefits
More than a third of Scottish businesses do not believe they are adequately prepared to deal with a cyber security incident Continue Reading
-
Opinion
02 Jun 2021
Security Think Tank: Steps to a coherent print security strategy
Though rarely discussed in a cyber context, the prevalence of connected printers and MFPs poses security risks both technological and physical. What does a print security strategy need to take into account? Continue Reading
-
Feature
02 Jun 2021
What the Telecommunications (Security) Bill means for UK industry
The Telecommunications (Security) Bill is intended to reinforce the security of the UK telecommunications infrastructure, but what are the implications for industry? Continue Reading
-
Feature
02 Jun 2021
Buying a VPN? Here’s what you need to know
VPNs are an effective cyber security tool for businesses and remote workers, but there are many things to consider before purchasing and implementing one. We explore some of these Continue Reading
-
Opinion
02 Jun 2021
Security Think Tank: Printer risks go deep into IT history
Though rarely discussed in a cyber context, the prevalence of connected printers and MFPs does pose security risks both technological and physical. What does a print security strategy need to take into account? Continue Reading
-
Opinion
01 Jun 2021
Long-term thinking is vital to secure UK’s critical infrastructure
To face down the threat of cyber warfare against UK CNI, the government needs long-term thinking that looks beyond the next general election cycle, says Advent-IM’s Mike Gillespie Continue Reading
-
News
01 Jun 2021
European-led consortium investigates quantum cryptography
The arms race to a quantum internet is under way – the European Commission is looking at secure critical national infrastructure and member state comms Continue Reading
-
News
01 Jun 2021
Exagrid pays $2.6m to Conti ransomware attackers
Backup appliance specialist hit by Conti ransomware in May with cyber criminals downloading employee and customer data, confidential contracts and source code Continue Reading
-
News
01 Jun 2021
Ex-IT manager stole over £800,000 from NHS trust
A former senior IT manager at an Essex NHS trust has pleaded guilty to defrauding his employer out of more than £800,000 Continue Reading
-
Definition
01 Jun 2021
Amazon Cognito
Amazon Cognito is an Amazon Web Services product that controls user authentication and access for mobile applications on internet-connected devices. Continue Reading
-
News
31 May 2021
Microsoft brings APAC policymakers together in security council
Microsoft’s APAC public sector security council will meet once a quarter to share threat intelligence and best practices for combating cyber threats Continue Reading
-
Feature
28 May 2021
Inept cybersecurity education and training feed into skills gap
Learn why former infosec instructor and author of 'How Cybersecurity Really Works' advocates for changes to security education and training to alleviate the industry skills gap. Continue Reading
-
Feature
28 May 2021
Network reconnaissance techniques for beginners
In this excerpt of 'How Cybersecurity Really Works,' author Sam Grubb breaks down common network reconnaissance techniques used by adversaries to attack wired networks. Continue Reading
-
Answer
28 May 2021
When should you use AWS IAM roles vs. users?
Access management is critical to securing the cloud. Understand the differences between AWS IAM roles and users to properly restrict access to AWS resources. Continue Reading
-
News
28 May 2021
Privacy experts concerned over NHS data collection plans
Security and data privacy experts warn NHS Digital that its data collection plans could increase risk and cause a public backlash Continue Reading
-
Guide
28 May 2021
Essential Guide: How APAC firms can ride out the pandemic
In this Essential Guide, we examine the impact of Covid-19 on Asia-Pacific businesses, how they have responded and important lessons that can be learned as they ready themselves for the post-pandemic world. Continue Reading
-
27 May 2021
Industry reflects on three years of GDPR
Looking back on 12 tumultuous months, we assess how GDPR has weathered the effects of the Covid-19 pandemic and Brexit, and consider what the coming year may hold for data protection Continue Reading
-
News
27 May 2021
Loss of 150,000 police records made worse by management failures
The loss of 150,000 records from a number of national policing systems was caused by a human coding error, but made worse by process and management failures Continue Reading
-
News
27 May 2021
Security ops teams struggle to switch off at home
Spiralling stress levels among SOC and IT security teams can be attributed mainly to alert overload, says Trend Micro Continue Reading
-
E-Zine
27 May 2021
CW Nordics: Denmark takes a top-down approach to gender equality in tech entrepreneurship
Tech Nordic Advocates has adopted a new approach to closing the gender gap in Danish technology startups, looking to emulate Canada’s top-down approach. Also in this issue, find out the state of play with the adoption of open banking in Europe. Continue Reading
-
News
27 May 2021
NGOs file complaints against Clearview AI in five countries
Privacy and human rights organisations have asked data protection regulators in the UK, France, Austria, Italy and Greece to investigate controversial facial recognition company Clearview AI Continue Reading
-
News
26 May 2021
More data stolen in January 2021 than in all of 2017, says report
The volume of data being stolen through breaches is growing steadily and shows no sign of slowing, according to a report from Imperva Continue Reading
-
News
26 May 2021
Millions of pounds lost to crypto fraud on social media
More than £63m has been lost nationally by victims of investment fraud via a social media platform, says Action Fraud Continue Reading
-
Blog Post
25 May 2021
Lessons from the Post Office Horizon Case
The presumption of the machine functioning properly in practice, means that the prosecution can rely on the presumption that a computer was operating reliably at all material times. It needs to be ... Continue Reading
-
News
25 May 2021
GCHQ bulk interception programme breached privacy rights, Strasbourg court rules
European Court of Human Rights finds that the UK’s bulk surveillance programme breached citizens’ privacy rights Continue Reading
-
Opinion
25 May 2021
Policies key to revolutionising Identity Governance and Administration
The proliferation of digital identities, applications, data, security threats and compliance requirements means that Identity Governance and Administration (IGA) has never been more important, but not all organisations are approaching it in an effective and efficient way Continue Reading
-
News
25 May 2021
CyberSprinters game gives kids a head start, says NCSC
An online game for primary schools, clubs and youth organisations will teach children aged seven to 11 the fundamentals of staying safe online Continue Reading