IT security
-
News
18 Jun 2025
Traditional fake news detection fails against AI-generated content
As generative AI produces increasingly convincing text, Dutch researchers are exploring how linguistic cues, model bias, and transparency tools can help detect fake news. Continue Reading
-
News
17 Jun 2025
Cyber action plan kicks off to ‘supercharge’ UK security sector
UK government says its cyber growth action plan will provide a large boost to Britain’s security industry as it sets out to create a roadmap for future growth Continue Reading
By- Alex Scroxton, Security Editor
-
E-Zine
07 Jul 2015
CW Europe – July 2015 Edition
The economy in central and eastern Europe (CEE) is starting to recover, which means investment in IT across the region is also starting to return. This issue of CW Europe investigates how the boost in IT is changing the role of the CIO, from supporting the business to driving its growth. Continue Reading
-
E-Zine
07 Jul 2015
The IT behind Angry Birds
In this week's Computer Weekly, we talk to the CIO of Rovio Entertainment, the company behind the gaming phenomenon Angry Birds, about how he supports a global business with a five-person IT team. We assess your options for moving off Windows Server 2003 now support is ending. And our buyer's guide looks at log management. Read the issue now. Continue Reading
-
News
06 Jul 2015
The internet of things could save the honeybee from extinction
Gemalto’s M2M unit is developing an ambitious project with agricultural science firm Eltopia and the University of Minnesota. The objective: to save the honeybee from extinction Continue Reading
By- Alex Scroxton, Security Editor
-
News
06 Jul 2015
Italy’s Hacking Team gets hacked
Unknown hackers have posted a torrent file-sharing link to more than 400GB of Hacking Team data, including source code, internal documents and emails that could reveal the identity of customers Continue Reading
-
News
03 Jul 2015
Wi-Fi enhances guest experience and profitability for Belgian theme park
Bobbejaanland, one of the largest theme parks in Belgium, is using a Fortinet Wi-Fi network to offer visitors access on the go, and improve its management capabilities Continue Reading
By- Xavier Mertens
-
News
02 Jul 2015
How Deutsche Telekom plans to challenge AWS and Google in the cloud
German telco Deutsche Telekom wants to evolve into the public cloud and plans to beat sector giants such as Amazon and Google at their own game Continue Reading
By -
News
02 Jul 2015
Facebook wins first round in European privacy battle
Facebook has welcomed a Vienna court’s rejection of a 25,000-strong class action lawsuit against the social networking firm for allegedly breaching European privacy laws Continue Reading
By- Warwick Ashford, Senior analyst
-
News
01 Jul 2015
UK universities revise computer course guidelines to boost ranks of cyber warriors
UK universities revise course guidelines to transform computing degree courses and ensure that undergraduates learn cyber security skills Continue Reading
By- Warwick Ashford, Senior analyst
-
News
29 Jun 2015
Cisco launches IoT System for enterprise and smart cities
Cisco unveils 15 products to address the growing complexity of internet of things deployments Continue Reading
By- Alex Scroxton, Security Editor
-
E-Zine
29 Jun 2015
The legacy IT challenge for CIOs
In this week’s Computer Weekly, CIOs in financial services hoping to fight off challenger banks face a huge hindrance from their legacy IT – we assess the difficulties and reveal a diagram that shows the scale of the problem. We look at how to prepare for information security audits and why they are so vital. And we ask if HM Revenue & Customs’ plan for online tax accounts will make tax more taxing for the digitally excluded taxpayer. Read the issue now. Continue Reading
-
News
26 Jun 2015
Computer Weekly European User Awards 2015 winners revealed
The winners have been announced for the Computer Weekly European User Awards 2015. See who made the top spots Continue Reading
By- Kayleigh Bateman, Computer Weekly
-
News
26 Jun 2015
Dutch court orders Facebook to identify revenge porn poster
Facebook has a legal obligation to provide information about a user who posted a revenge porn video on the site, a Dutch court has ruled Continue Reading
By- Warwick Ashford, Senior analyst
-
Opinion
26 Jun 2015
Three things you may not know that DNS data can tell you
Big data tools can help network administrators gather new insights into security and performance from DNS data Continue Reading
By- Simon McCalla, Nominet
-
Feature
24 Jun 2015
App development companies fight back against digital piracy
How can digital companies protect their IP against a tidal wave of smartphone boosted piracy? Is digital rights management software effective enough, or is it better to adapt your business model? Continue Reading
-
News
24 Jun 2015
IT professionals give Windows 10 Start button the thumbs up
A survey of European and North American IT professionals has found that the return of the Start button is the most enticing feature in Microsoft's latest operating system Continue Reading
By- Cliff Saran, Managing Editor
-
News
23 Jun 2015
Pharmaceutical companies use BPM to cut cost of clinical trial drugs
Pharmaceutical companies have developed an IT system to secure the supply of medicines they need for clinical studies, saving hundreds of thousands on their drugs bill in the process Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
22 Jun 2015
Government Digital Service insists Verify safe despite claims of vulnerabilities
An academic paper suggests the Gov.uk Verify system could be used as a spy network, but the Government Digital Service (GDS) insists this is not the case Continue Reading
By- Clare McDonald, Business Editor
-
News
17 Jun 2015
FBI investigates US baseball team over rival's hacking allegations
FBI investigations, into claims a US baseball team stole data from a rival, highlights cyber crime perpetrated by competitors – not just anonymous criminals Continue Reading
By- Warwick Ashford, Senior analyst
-
News
17 Jun 2015
DD4B cyber extortion gang ramps up operations
Cyber criminals using DDoS attacks to extort funds from victims are carrying out more attacks despite a $26,000 bounty Continue Reading
By- Warwick Ashford, Senior analyst
-
News
12 Jun 2015
Government preparing to let private sector companies use its Verify identity scheme
The Cabinet Office is talking to banks, insurers and retailers to establish Gov.uk Verify identity assurance as a national scheme Continue Reading
By -
News
11 Jun 2015
Kaspersky Lab praised for handling of Duqu 2.0 cyber attack
Kaspersky Lab determined the best approach to cyber attack was to not only admit that it had been hacked, but also to provide extensive information on the malware Continue Reading
By- Warwick Ashford, Senior analyst
-
News
10 Jun 2015
International police operation arrests cyber fraud gang
Police in six countries have arrested 49 people suspected of committing financial fraud involving email account intrusions Continue Reading
By- Warwick Ashford, Senior analyst
-
Feature
09 Jun 2015
How to cull old, potentially risky data
Unused data is a potential security risk, with old spreadsheets, reports and email containing industry secrets and laced with company gossip. If it's no longer useful, it's time to delete it Continue Reading
By- Christian Cawley
-
E-Zine
08 Jun 2015
The file-sharing face-off: Box or Dropbox
In this week's Computer Weekly, we look at the two most popular tools for cloud-based enterprise file sharing and assess the relative merits of Box and Dropbox. We talk to some of the early pioneers in developing smartwatch apps. And we find out why IT security spending is shifting from prevention to detection and response. Read the issue now. Continue Reading
-
News
03 Jun 2015
VMware puts network virtualisation to work in McAfee environments
VMware announces an integrated system to automate distribution and enforcement of McAfee’s network security platform using its NSX network virtualisation system Continue Reading
By- Alex Scroxton, Security Editor
-
News
02 Jun 2015
The drivers and inhibitors of cyber security evolution
A study shows a shift in IT security spending to detection and response – but why are most organisations falling way behind the more enlightened front runners? Continue Reading
By- Warwick Ashford, Senior analyst
-
News
01 Jun 2015
Most of more than 733,000 police communications data requests approved
Big Brother Watch is calling for a curb on the scale of police access to communications data and greater transparency in the use of this data Continue Reading
By- Warwick Ashford, Senior analyst
- Guide 30 May 2015
-
News
29 May 2015
Data classification key to IP protection, says Titus
Data classification can help organisations get more value out of encryption and data loss prevention systems Continue Reading
By- Warwick Ashford, Senior analyst
-
News
29 May 2015
Google announces security features for Android
Google announces better app permission controls and other Android security changes at its Google I/O developer conference Continue Reading
By- Warwick Ashford, Senior analyst
-
News
27 May 2015
CIF cloud certification scheme wins European Commission's backing
Cloud Industry Forum's Code of Practice has been added to European list of trusted certification schemes Continue Reading
By- Caroline Donnelly, Senior Editor, UK
-
News
27 May 2015
Social engineering attacks more complex than ever, says expert
Expert warns attackers are starting to use increasingly sophisticated ways to get people in organisations to help them circumvent security controls Continue Reading
By- Warwick Ashford, Senior analyst
-
News
26 May 2015
NATS failure down to bug from the 90s and redundant code
A bug present in Nats since 1990s has been identified as the root cause of the five-hour outage of UK air traffic control on 12 December 2014 Continue Reading
By- Cliff Saran, Managing Editor
-
Feature
26 May 2015
How to reduce the risk of social engineering attacks
Implement simple checks to reduce the risk of the main types of social engineering attacks Continue Reading
By- Peter Wood, First Base Technologies LLP
-
News
22 May 2015
Researchers raise privacy concerns about Bluetooth Low Energy devices
Researchers have raised privacy concerns about a growing number of devices using Bluetooth Low Energy technology Continue Reading
By- Warwick Ashford, Senior analyst
-
News
21 May 2015
CIO interview: Austerity drives joined-up council IT with Force.com
Peterborough has become a big user of software-as-a-service for council services. We speak to its IT head Continue Reading
By- Cliff Saran, Managing Editor
-
News
20 May 2015
BT Openreach turns to Crimestoppers to catch cable thieves
Openreach extends its partnership with crime-fighting charity Crimestoppers to tackle cable theft Continue Reading
By- Alex Scroxton, Security Editor
-
News
19 May 2015
Google slashes public cloud prices to undercut rivals
Google cuts cost of its public cloud services to pass on hardware savings in line with Moore's Law Continue Reading
By- Caroline Donnelly, Senior Editor, UK
-
News
19 May 2015
St Louis Federal Reserve Bank not target of DNS hack, say experts
The hacking of a domain name server (DNS) for the Federal Reserve Bank of St Louis is more likely to be aimed at customers than the bank itself, say security experts Continue Reading
By- Warwick Ashford, Senior analyst
-
News
18 May 2015
Wi-Fi Global Congress: Hotspot 2.0 standard addresses wireless security holes
At Wi-Fi Global Congress, Ruckus Wireless announces it will be first to market with the second release of Hotspot 2.0 Continue Reading
By- Alex Scroxton, Security Editor
-
News
18 May 2015
Whitehall technology chiefs vetoed new Windows XP support deal
Government technology chiefs vetoed a new deal with Microsoft to continue Windows XP support to force laggards to move off the OS Continue Reading
By- Bryan Glick, Editor in chief
-
News
14 May 2015
Digital age a turning point for policing, says commissioner Leppard
Policing in the digital age will face a turning point in the next two years, according to City of London Police commissioner Adrian Leppard Continue Reading
By- Warwick Ashford, Senior analyst
-
News
12 May 2015
Former nurse’s career blighted after blowing whistle on IT problems
Southwark's continuing care database included names of patients who had been dead for several years, a tribunal is told Continue Reading
By- Julia Gregory and Bill Goodwin
-
News
11 May 2015
PSNGB rebrands to drive information sharing across PSN
PSNGB, the trade association set up to promote the Public Services Network, rebrands itself as Innopsis and says its work is far from over Continue Reading
By- Alex Scroxton, Security Editor
-
News
08 May 2015
The IoT industry needs to do more to secure data, says Beecham Research
There are key areas where the industry supporting the internet of things (IoT) needs to provide better security, according to Beecham Research Continue Reading
By- Warwick Ashford, Senior analyst
-
E-Zine
08 May 2015
CW Europe – May 2015 Edition
In this issue, CW Europe's security editor investigates whether the legislation could strangle Europe's productivity and whether businesses see the regulations as a burden. Continue Reading
-
News
07 May 2015
Businesses should prepare for black swans, says resiliency consultant
While black swan events are random and unexpected, businesses can still prepare for them, according to a resiliency consultant Continue Reading
By- Warwick Ashford, Senior analyst
-
News
07 May 2015
Future IAM will need to be broader, says Martin Kuppinger
Identity and access management systems need to look at all forms of identity, not just employees or users, says KuppingerCole analyst Continue Reading
By- Warwick Ashford, Senior analyst
-
E-Zine
05 May 2015
UK election special – who wins the digital vote?
In this week’s Computer Weekly, as the UK goes to the polls in the general election, we take an in-depth look at the political parties’ manifestos for technology, and examine what the IT sector wants from the next government. Our latest buyer’s guide covers collaboration software. And we analyse host identity protocol (HIP), an emerging standard for endpoint security. Read the issue now. Continue Reading
-
News
30 Apr 2015
IoT benefits and privacy not mutually exclusive, says industry expert
It is possible to mitigate the privacy and security risks of the internet of things (IoT) without losing its benefits, according to an industry expert Continue Reading
By- Warwick Ashford, Senior analyst
-
News
30 Apr 2015
Ryanair remains tight-lipped over £3.3m hacker theft
Ryanair provided no details of how hackers took £3.3m from one of its bank accounts, as industry pundits call for greater collaboration Continue Reading
By- Warwick Ashford, Senior analyst
-
News
29 Apr 2015
Time to embrace a new level of IAM, says Martin Kuppinger
A new level of identity and access management is at hand, yet many businesses still rely on usernames and passwords Continue Reading
By- Warwick Ashford, Senior analyst
-
News
29 Apr 2015
Vodafone sends network in a backpack to Nepal earthquake zone
Vodafone’s charitable arm, the Vodafone Foundation, deploys instant mini networks to help restore communications in quake-hit Nepal Continue Reading
By- Alex Scroxton, Security Editor
-
Feature
27 Apr 2015
Top tips for remote and mobile workers to improve their cyber security
Steps remote and mobile workers can take to improve cyber security on mobile devices, using public Wi-Fi and computers, and handling USB devices Continue Reading
By- Peter Wood, First Base Technologies LLP
-
News
27 Apr 2015
EU data protection regulation will drive privacy by design, says KuppingerCole
The EU data protection regulation will drive privacy by design in companies with European clients, says KuppingerCole analyst Karsten Kinast Continue Reading
By- Warwick Ashford, Senior analyst
-
Feature
25 Apr 2015
Bill Binney, the ‘original’ NSA whistleblower, on Snowden, 9/11 and illegal surveillance
Always a patriot: Computer Weekly talks to Bill Binney, the senior NSA official who blew the whistle before Edward Snowden Continue Reading
-
News
23 Apr 2015
Mobile malware overhyped, says security company Damballa
Mobile internet users are 1.3 times more likely to get struck by lightning than infected by mobile malware, research by security firm Damballa finds Continue Reading
By- Warwick Ashford, Senior analyst
-
News
22 Apr 2015
Destructive cyber attacks making security a business concern, says Microsoft
Destructive cyber attacks are driving a fundamental shift in the information security market, according to Microsoft Continue Reading
By- Warwick Ashford, Senior analyst
-
News
22 Apr 2015
HSBC website mistake guides customers to porn
HSBC’s Hong Kong website accidentally featured an out-of-date link that directed people to a porn site Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
22 Apr 2015
Collaboration key to cyber security, says US homeland security chief
Collaboration between governments and with the private sector key to improving global cyber security Continue Reading
By- Warwick Ashford, Senior analyst
-
E-Zine
20 Apr 2015
The future of Moore's Law at 50
In this week's Computer Weekly, Moore's Law – the seminal forecast by Intel founder Gordon Moore that oversees technology development – is 50 years old. We look at its modern relevance and future implications. IT chiefs discuss whether Windows is still core to their strategy. And we look back at five years of government IT. Read the issue now. Continue Reading
-
News
17 Apr 2015
Cyber security boot camp launched to boost skills
Sans Cyber Academy unveils eight-week security boot camp after businesses demand more cyber security specialists Continue Reading
By- Kayleigh Bateman, Computer Weekly
-
News
15 Apr 2015
Liberal Democrats promise to double innovation spend and 99.9% broadband roll-out
The Liberal Democrats’ general election manifesto promises to double innovation spending and roll out high-speed broadband to 99.9% of homes Continue Reading
By- Bryan Glick, Editor in chief
-
News
15 Apr 2015
Banks hide cyber crime losses, says City of London Police
Banks obscure the amount of money lost to cyber fraudsters – preferring to write off cyber theft as operating losses – says the City of London Police Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
14 Apr 2015
Security risk potential linked to young, mobile users
A study conducted by wireless supplier Aruba Networks has identified a distinct cohort of high-risk, security-agnostic workers Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
14 Apr 2015
Can legislation stop cyber crime?
Rising cyber crime suggests criminal law does not deter criminals and that a better legal solution is required to prevent further rises Continue Reading
By- Stewart James
-
E-Zine
13 Apr 2015
Taking stock of e-commerce systems
In this week's Computer Weekly, the first of our three-part buyer's guide to next generation e-commerce looks at managing inventory in multi-channel retailers. We highlight the six technology companies that are threats to the dominance of high-street banks. And we examine the top five issues in virtual machine backup. Read the issue now. Continue Reading
-
Feature
10 Apr 2015
NHS data security: Lessons to be learned
The NHS does not always provide a trusted repository for patient data, but some trusts are examples of good practice in action Continue Reading
By -
News
10 Apr 2015
French TV5Monde network cyber attack the latest in destructive trend in system intrusions
The cyber attack on French television network TV5Monde is the latest in a growing list of incursions intended to destroy data and IT systems Continue Reading
By- Warwick Ashford, Senior analyst
-
News
08 Apr 2015
Exit checks system for UK borders finally goes live
The Home Office launches a system for making exit checks of travellers at UK borders, following the scrapped e-Borders programme Continue Reading
By- Bryan Glick, Editor in chief
-
News
08 Apr 2015
Alleged White House hack highlights typical security failings, say experts
The alleged penetration of sensitive White House computer networks highlights typical security failings, say information security experts Continue Reading
By- Warwick Ashford, Senior analyst
-
News
08 Apr 2015
CIO interview: Bruna Pellicci, global head of IT, Ashurst
Global law firm Ashurst is rolling out a new IT strategy based on single platforms worldwide for its core business areas Continue Reading
By -
Feature
01 Apr 2015
Mobile device management (MDM) vs backup
MDM tackles the challenge of mobile devices flooding the enterprise, but it doesn’t mean you can stop worrying about mobile data protection Continue Reading
By -
News
31 Mar 2015
AWS gets EU approval for data replication outside of Europe
The European Union Data Protection Authorities has approved Amazon Web Services’ Data Processing Agreement Continue Reading
By- Cliff Saran, Managing Editor
-
News
31 Mar 2015
DDoS losses potentially £100k an hour, survey shows
DDoS attacks could expose 40% of businesses to losses of £100,000 or more an hour at peak times, a survey shows Continue Reading
By- Warwick Ashford, Senior analyst
-
News
30 Mar 2015
British Airways rewards scheme hack highlights password problem
The hacking of British Airways’ executive club frequent flyer accounts shows the importance of using strong, unique passwords for all online accounts Continue Reading
By- Warwick Ashford, Senior analyst
-
News
26 Mar 2015
Samsung targets business with Microsoft tools integration
Samsung has pre-installed Microsoft OneNote, OneDrive, and Skype on the new Galaxy S6 and Galaxy S6 edge, as it expands into business Continue Reading
By- Cliff Saran, Managing Editor
-
News
26 Mar 2015
UK attacks on crypto keys and digital certificates endemic
All UK security professionals polled in a global survey have responded to attacks on keys and certificates in past two years Continue Reading
By- Warwick Ashford, Senior analyst
-
News
25 Mar 2015
UK government adds five authentication providers to Gov.uk Verify identity management system
The Government Digital Service (GDS) adds five authentication providers to the Gov.uk Verify identity and access management scheme Continue Reading
By- Clare McDonald, Business Editor
-
News
25 Mar 2015
Identity fraud still top UK fraud threat
Identity fraud continues to be the single biggest fraud threat, according to the latest report by UK fraud prevention service Cifas Continue Reading
By- Warwick Ashford, Senior analyst
-
News
24 Mar 2015
Google warns of fake digital certificates
Google has warned of unauthorised digital certificates issued for several of its domains that could be used to intercept data traffic Continue Reading
By- Warwick Ashford, Senior analyst
-
News
20 Mar 2015
Home devices threaten enterprise data security, warn researchers
Poor or lacking security on ADSL routers and other devices used by teleworkers a threat to global enterprise information security Continue Reading
By- Warwick Ashford, Senior analyst
-
News
19 Mar 2015
Target agrees to $10m breach compensation
US retailer Target has agreed to a $10m compensation package for victims of its 2013 data breach Continue Reading
By- Warwick Ashford, Senior analyst
-
News
18 Mar 2015
Ford drives connected car journey with Microsoft Azure
The Microsoft Azure cloud will be used to power Ford's new software delivery and vehicle monitoring service Continue Reading
By- Caroline Donnelly, Senior Editor, UK
-
News
18 Mar 2015
Premera hack exposes 11 million financial and medical records
US health insurance firm Premera Blue Cross reveals an IT systems breach, exposing financial and medical records of 11 million customers Continue Reading
By- Warwick Ashford, Senior analyst
-
News
17 Mar 2015
Microsoft warns of fake SSL certificate for Windows Live
Microsoft has warned that a fake security certificate has been issued for the Windows Live domain that could be abused by attackers Continue Reading
By- Warwick Ashford, Senior analyst
-
News
13 Mar 2015
Lookout bets on big data analytics to secure enterprise mobiles
Mobile security SaaS provider Lookout is betting on its cloud-based big data analytics capability to attract enterprise customers Continue Reading
By- Warwick Ashford, Senior analyst
-
News
13 Mar 2015
Japan recruits hackers for cyber security force
The Japanese government plans to recruit hackers to identify and protect against cyber security threats Continue Reading
By- Warwick Ashford, Senior analyst
-
News
11 Mar 2015
Why IAM is topping security investments in 2015
It is not surprising identity and access management (IAM) is set to move to the fore in 2015 Continue Reading
By- Warwick Ashford, Senior analyst
-
News
09 Mar 2015
US cyber crime indictment prompts calls for zero tolerance
A newly-revealed US indictment of three suspected cyber criminals has prompted a call for zero tolerance for cyber intrusions Continue Reading
By- Warwick Ashford, Senior analyst
-
News
09 Mar 2015
Group claiming links to Isis hacks small business websites
The FBI is investigating the hacking of a number of SME websites in the US and Europe by people claiming affiliation with Islamic State Continue Reading
By- Warwick Ashford, Senior analyst
-
News
09 Mar 2015
2015 IT priorities: SDN yet to prove itself, fear of network hacks growing
In Computer Weekly’s 2015 IT priorities study, software-defined networking is still behind management and monitoring as a networking priority Continue Reading
By- Alex Scroxton, Security Editor
-
News
06 Mar 2015
How to ensure your hot-desking colleagues keep their data secure
Once hot-desking is implemented, data security suddenly demands greater attention Continue Reading
By- Christian Cawley
-
Feature
06 Mar 2015
How to secure the SDN infrastructure
As more enterprises look to deploy software-defined networking, the need for security from the ground up should not be underestimated Continue Reading
By -
News
05 Mar 2015
China and US cross swords over software backdoors
Barack Obama criticises Chinese plans to force tech firms trading in China to share encryption keys and put backdoors in software Continue Reading
By- Warwick Ashford, Senior analyst
-
Feature
02 Mar 2015
Cyber crime: What every business needs to know
Computer Weekly gets the low-down on cyber crime from law enforcement officers and investigators Continue Reading
By- Warwick Ashford, Senior analyst
-
News
27 Feb 2015
Case study: Norwegian insurer invests in Darktrace machine-learning cyber defence
Shipping insurance company DNK hopes to inspire the rest of the shipping industry to adopt Darktrace’s cyber defence system Continue Reading
-
News
26 Feb 2015
Cloud security still needs a lot more work, say European experts
Security and privacy remain a stumbling block for cloud computing, according to information experts at the Trust in the Digital World conference Continue Reading
By- Warwick Ashford, Senior analyst
-
News
25 Feb 2015
RASP helps apps protect themselves, but is it ready for the enterprise?
A new technology called runtime application self-protection is being touted as a next big thing in application security. But not everyone is singing its praises. Continue Reading
By- Nicole Laskowski, Senior News Director
-
News
24 Feb 2015
UK consumers lack confidence in data protection, study finds
UK consumers do not believe businesses or governments do enough to protect their data, according to to Symantec’s State of Privacy report Continue Reading
By- Warwick Ashford, Senior analyst