IT security
-
E-Zine
07 Dec 2023
CW EMEA: Prepare for cyber war
When the war between Hamas and Israel began in October, cyber security professionals and major government and private organisations braced for an inevitable accompanying online war. In this issue of CW EMEA, we outline cyber war, patterns of threat activity, and find out what security teams can do to protect their organisations. We also look at Finland’s advances in quantum computing, how Belgian researchers have developed technology to help datacentres process data faster, and the secrets of KPN’s successful business transformation. Read the issue now. Continue Reading
-
E-Zine
09 Nov 2023
Heineken lets the data flow
In this month’s CW EMEA ezine, we find out about Heineken’s mission to make the most out of the data it holds through an enterprise-wide data ecosystem. We also look at how the UK has turned its back on the German government-funded Gaia-X data platform, why cyber experts are urging the EU to rethink vulnerability disclosure plans, and how the IT industry is responding to the software developer skills shortfall. Read the issue now. Continue Reading
-
News
12 Jan 2016
Police take action against cyber extortion gang DD4BC
Police have made one arrest and gathered evidence in searches of properties in an international operation aimed at cyber extortion gang DD4BC Continue Reading
By- Warwick Ashford, Senior analyst
-
News
11 Jan 2016
ICO reiterates call for stronger sentences for data theft
The information commissioner (ICO) reiterates his call for stronger sentences for data theft after a court fined a woman just £1,000 for selling 28,000 customer records Continue Reading
By- Warwick Ashford, Senior analyst
-
News
08 Jan 2016
Tech firms critical of UK draft Investigatory Powers Bill
Facebook, Google, Microsoft, Twitter and Yahoo say they are particularly concerned about six key aspects of the UK's draft Investigatory Powers Bill Continue Reading
By- Warwick Ashford, Senior analyst
-
News
06 Jan 2016
UK IoT research hub opens with support from academic world
A consortium of nine UK universities have come together to work alongside the Engineering and Physical Sciences Research Council on research into the internet of things Continue Reading
By- Alex Scroxton, Security Editor
-
News
06 Jan 2016
Upgrade to Internet Explorer 11 to reduce risk
Failure to update to the latest version of Internet Explorer by 12 January 2016 could put users at risk, Microsoft warns Continue Reading
By- Warwick Ashford, Senior analyst
-
Feature
05 Jan 2016
Interview: James Bamford on surveillance, Snowden and technology companies
Investigative journalist and documentary maker James Bamford was among the first to uncover the secrets of the US National Security Agency and its global surveillance Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
31 Dec 2015
Top 10 internet of things stories of 2015
2015 was the year the internet of things began to move from theory to widespread practice, and the fledgling industry shook off the millstone of connected kitchen appliances Continue Reading
By- Alex Scroxton, Security Editor
-
News
24 Dec 2015
Top 10 IT security stories of 2015
Computer Weekly looks back at the most significant stories on IT security in the past 12 months Continue Reading
By- Warwick Ashford, Senior analyst
-
News
23 Dec 2015
Top 10 cyber crime stories of 2015
Computer Weekly takes a look back at the top cyber crime stories of 2015 Continue Reading
By- Warwick Ashford, Senior analyst
-
News
18 Dec 2015
Glasgow city email disruption continues after datacentre crash
Glasgow's IT woes continue following a shutdown of its datacente on Tuesday Continue Reading
By- Cliff Saran, Managing Editor
-
News
17 Dec 2015
National security ‘not affected’ by failed e-Borders programme, says Home Office
Despite the key Warnings Index system suffering an average of two high-priority incidents a week – such as a system component not being available – Home Office officials deny it causes risk to national security Continue Reading
By- Bryan Glick, Editor in chief
-
E-Zine
16 Dec 2015
Cloud IT is helping Uefa meet its goals
In this week’s Computer Weekly, we find out how cloud computing is helping European football federation Uefa with preparations for the Euro2016 tournament. We ask if UK government moves to support IT education are enough to bridge the skills gap. And we examine the new international standard for personal data privacy in the cloud and what it means for suppliers. Read the issue now. Continue Reading
-
News
15 Dec 2015
Bracknell man arrested over VTech toy hack
Police have arrested a 21-year-old man in connection with the hacking of Hong Kong-based toymaker VTech Continue Reading
By- Alex Scroxton, Security Editor
-
News
11 Dec 2015
Eight startups selected for Cyber London security accelerator programme
Cyber London has selected startups from the UK, Finland, Hungary, Israel, Brazil and South Africa for its second cyber security accelerator programme Continue Reading
By- Warwick Ashford, Senior analyst
-
News
11 Dec 2015
UK firms act quickly to fix payment card data encryption
Security firm found that 16 global companies had failed to effectively encrypt traffic to the payment portion of their websites and apps Continue Reading
By- Warwick Ashford, Senior analyst
-
Feature
10 Dec 2015
How to deal with the aftermath of a data breach
Considering that a data breach could happen to any company, at any time, a plan of action is the best tactic Continue Reading
By -
Feature
10 Dec 2015
Disaster recovery planning: Where virtualisation can help
The disaster recovery planning process is not fundamentally technology-centric, so when can virtualisation make it quicker and easier to restore services after an unplanned outage? Continue Reading
By -
News
09 Dec 2015
The FCA is open to cloud – but what of the firms it regulates?
The Financial Conduct Authority (FCA) says cloud computing – even in its public form – is acceptable for finance organisations Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
E-Zine
08 Dec 2015
The most influential people in UK IT 2015
In this week’s Computer Weekly, we announce our sixth annual UKtech50 list of the 50 most influential people in UK IT, and talk to this year’s winner – BT chief executive Gavin Patterson, about the challenges facing the telecoms giant in 2016. Also, we find out how the genomics industry is pushing big data technology to its limits. Read the issue now. Continue Reading
-
Feature
07 Dec 2015
The next stage in quantum key distribution
Authentication schemes based on quantum physics are emerging to address the growing number of ways to compromise data traffic Continue Reading
-
News
07 Dec 2015
Cyber attacks an increasing concern for Asean countries
Organisations in the Association of Southeast Asian Nations are increasingly the targets for cyber criminals, according to a report focused on the region Continue Reading
By -
Guide
07 Dec 2015
Essential guide to data breaches, the dark web and the hidden data economy
In this guide, we look at the aftermath of a data breach - what do cyber criminals use that stolen data for, and what can companies do to avoid becoming a victim? Continue Reading
-
News
04 Dec 2015
Wetherspoon pub chain warns customers of data breach
Discovery of a data breach at JD Wetherspoons comes hard on the heels of a breach at TalkTalk, underlining the importance of keeping customer data safe Continue Reading
By- Warwick Ashford, Senior analyst
-
News
03 Dec 2015
Veracode finds most web apps fail Owasp security check list
The findings of a report on critical vulnerabilities in most web applications is raising concerns over potential security vulnerabilities in millions of websites Continue Reading
By- Warwick Ashford, Senior analyst
-
News
03 Dec 2015
The US and China agree more steps to fight cyber crime
The US and China have made progress in expanding co-operation on cyber crime as China claims criminals and not state-backed hackers broke into the US Office of Personnel Management Continue Reading
By- Warwick Ashford, Senior analyst
-
News
03 Dec 2015
Workday ringfences support in Europe after Safe Harbour ruled unsafe
US cloud HR and financial services provider reponds to Safe Harbour failure by ringfencing European data Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
01 Dec 2015
Security analytics needs practical approach, says Fico Ciso Vickie Miller
Analytics must form part of a comprehensive defence-in-depth strategy, according to chief information security officer (Ciso) Vickie Miller at software firm Fico Continue Reading
By- Warwick Ashford, Senior analyst
-
E-Zine
01 Dec 2015
Balancing speed and risk in IT projects
In this week’s Computer Weekly, as IT leaders face boardroom pressure to roll out IT projects ever more quickly, we examine how to do that without running unacceptable risks. Michael Dell talks about how he sees the future for his company when it buys EMC in the largest IT acquisition in history. And we hear from IT chiefs about the challenges of implementing DevOps. Read the issue now. Continue Reading
-
News
27 Nov 2015
Word ‘smart’ being abused by IoT advocates
Speakers at an event hosted by Cambridge Wireless say the term ‘smart’ is overused to describe connected devices on the internet of things Continue Reading
By- Alex Scroxton, Security Editor
-
News
26 Nov 2015
Microsoft steps up efforts to clarify cloud security and privacy policy
Microsoft debuts merged security information hub to make it easier for cloud users to find out more about the privacy and security policies of its hosted products Continue Reading
By- Caroline Donnelly, Senior Editor, UK
-
News
26 Nov 2015
Use legal protection to soften cyber attack impact, says Kemp Little
IT outsourcing provides an opportunity for businesses to transfer risk and recover losses from cyber attacks, says law firm Kemp Little Continue Reading
By- Warwick Ashford, Senior analyst
-
News
26 Nov 2015
Dridex banking Trojan regains strength to mount attacks on the UK
Fresh Dridex banking Trojan campaigns target the US, UK and France – despite a recent law enforcement takedown operation – warn security researchers Continue Reading
By- Warwick Ashford, Senior analyst
-
News
25 Nov 2015
Data breach hits Hilton Worldwide hotel chain
Hilton Worldwide says malware found its way onto point of sale (PoS) systems and enabled attackers to steal payment card information Continue Reading
By- Warwick Ashford, Senior analyst
-
News
24 Nov 2015
Defence review promises 1.2% of defence budget spend on technology
The government’s defence review highlights need for technology investment, innovative ideas and cyber security Continue Reading
By -
E-Zine
23 Nov 2015
Technology helping to deliver aid for refugees
In this week's Computer Weekly, we find out how technology is helping to deliver vital aid to Syrian refugees in the Middle East. We look at the barriers to achieving the government's aim of a paperless NHS. And the CTO of special effects studio Framestore talks about the IT challenges behind hit movies such as Gravity. Read the issue now. Continue Reading
-
News
20 Nov 2015
Five key strategies for IoT success
Companies need to be agile because in some IoT systems, it will be a question of the winner taking it all, according to Kent Eriksson, IoT business consultant at PTC Continue Reading
By- Warwick Ashford, Senior analyst
-
News
20 Nov 2015
Coalition of top tech firms opposes weakened encryption
Weakening security with the aim of advancing security simply does not make sense, a coalition of top tech firms tells US president Barack Obama Continue Reading
By- Warwick Ashford, Senior analyst
-
News
18 Nov 2015
Cyber security mindset needs to change, says report
Government organisations are prime targets for cyber attacks, leading to increased importance on robust information security, according to a report by Intel Security and the Digital Government Security Forum Continue Reading
By -
News
17 Nov 2015
Irish hospital to offer patient access to records by November 2016
Galway Clinic plans a big-bang launch of its Meditech electronic medical record system, which includes a patient portal and mobile app Continue Reading
By -
News
12 Nov 2015
Three men charged over JP Morgan hacking and fraud
Exploiting the Heartbleed bug was one of the methods used by three men charged in connection with the theft of more than 100 million customer data records from financial institutions to carry out "pump and dump" fraud Continue Reading
By- Warwick Ashford, Senior analyst
-
News
11 Nov 2015
Snoopers’ charter will force ISPs to raise broadband prices
The Science and Technology Select Committee hears that ISPs may be forced to put up their service charges to cover the cost of retaining communications data, should the Investigatory Powers Bill become law Continue Reading
By- Alex Scroxton, Security Editor
-
News
11 Nov 2015
Germany is finalising legislation to shore up CNI cyber security
Germany is working to ensure digital sovereignty through IT security legislation and negotiations on IT security regulations and transatlantic trade at a European Union level Continue Reading
By- Warwick Ashford, Senior analyst
-
News
10 Nov 2015
EU data protection official optimistic on successor to Safe Harbour
An EU data protection official says he is optimistic that an alternative to the Safe Harbour agreement will be found, but it will take work from both the US and the EU Continue Reading
By- Warwick Ashford, Senior analyst
-
News
09 Nov 2015
GCHQ and NCA join forces to police dark web
GCHQ and the National Crime Agency are to track down paedophiles and serious online criminals by using the techniques and expertise used to find terrorists Continue Reading
By- Warwick Ashford, Senior analyst
-
Feature
06 Nov 2015
Avoiding security issues when recycling hardware
What are the options for the environmentally and ethically responsible recycling of end-of-life hardware, without compromising data security? Continue Reading
-
E-Zine
05 Nov 2015
CW Europe – November 2015
Cloud computing has huge benefits to businesses in Europe, but data protection rules have been different for organisations in different parts of Europe. This is about to change with the final version of the General Data Protection Regulation (GDPR) expected soon. All 28 EU member states will have one set of rules to follow. Continue Reading
-
News
04 Nov 2015
UAE recognises importance of cyber security, says official
Like the UK, the UAE federal government has identified the importance of creating an environment in which it is safe to do business online Continue Reading
By- Warwick Ashford, Senior analyst
-
News
03 Nov 2015
Theresa May proposes bulk data and internet tracking under the Investigatory Powers Bill
The home secretary has unveiled the draft Investigatory Powers Bill, which sets out the government's plans to collect data on UK citizens' internet use Continue Reading
By- Cliff Saran, Managing Editor
-
News
02 Nov 2015
000Webhost blames PHP exploit for breach of 13.5 million records
Unencrypted passwords for a free web hosting firm were on sale for five months before customers were notified their records had been leaked, according to a security researcher Continue Reading
By- Warwick Ashford, Senior analyst
-
News
02 Nov 2015
Hewlett Packard Enterprise: think of us as a startup
As Hewlett Packard Enterprise and HP Inc finally part ways, UK managing director Andy Isherwood shares some insight on what the future holds for the newly minted enterprise business Continue Reading
By- Alex Scroxton, Security Editor
-
News
02 Nov 2015
Theresa May promises strong oversight in surveillance bill
The proposed Investigatory Powers Bill contains “very strong” oversight and “world-beating” authorisation procedures, according to home secretary Theresa May Continue Reading
By- Warwick Ashford, Senior analyst
-
News
30 Oct 2015
Law enforcement cracks down on DroidJack Android snooping malware users
A joint EU/US operation on the DroidJack malware is the latest example of international collaboration between law enforcement officers directed at cyber crime Continue Reading
By- Warwick Ashford, Senior analyst
-
News
29 Oct 2015
M&S data breach forces retailer to temporarily suspend service
A glitch that allowed online customers to see each others' details forced retailer Mark & Spencer to take its website offline while it resolved the issue Continue Reading
By- Clare McDonald, Business Editor
-
News
28 Oct 2015
Lack of data classification very costly to firms, says survey
Most data retained by organisations is not identified or classified and gobbles budget spent on storage, as well as being potentially non-compliant, reveals Veritas-sponsored survey Continue Reading
By- Antony Adshead, Storage Editor
-
E-Zine
26 Oct 2015
Blockchain sparks change in banking industry
In this week's Computer Weekly, we find out why blockchain, the technology that underpins bitcoin, is making waves in the banking sector. EasyJet tells us why digital is increasingly important for airlines. And we look at the forces driving digital disruption and why some sectors are changing faster than others. Read the issue now. Continue Reading
-
News
23 Oct 2015
TalkTalk warns customers about personal data breach
TalkTalk has warned customers their personal data may have been compromised in the second cyber attack on the firm in 2015, with some data left unencrypted Continue Reading
By- Warwick Ashford, Senior analyst
-
News
22 Oct 2015
Police and industry to tackle cyber crime together, says TechUK
A TechUK report calls for collaboration between police and industry to raise standards of reporting, recording and responding to cyber crime Continue Reading
By- Warwick Ashford, Senior analyst
-
News
21 Oct 2015
Infosec pros should start preparing for the future, say experts
Information security professionals need to grow their skills, engage with the business, increase security awareness, set business goals and tailor their messages, says a panel of experts Continue Reading
By- Warwick Ashford, Senior analyst
-
E-Zine
19 Oct 2015
IT giants Dell and EMC unite
In this week's Computer Weekly, Dell's proposed $67bn acquisition of EMC would be the biggest in the history of IT – we assess the implications. £175bn of IT outsourcing contracts come up for renewal in the next three years- what are your options? And we hear from IT leaders about security and the internet of things. Read the issue now. Continue Reading
-
News
19 Oct 2015
Dow Jones denies it was target of insider trading hack
Dow Jones says there is no information to support reports that it was the target of hackers seeking information for insider trading Continue Reading
By- Warwick Ashford, Senior analyst
-
News
19 Oct 2015
Opera chooses Workday over Oracle as it moves HR to cloud
Browser company Opera opts for slick internal IT as it competes with Apple and Google for skilled technologists Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
16 Oct 2015
Yahoo announces password-killing Account Key
Yahoo Account Key uses push notifications to provide a fast and secure way to access Yahoo accounts from a mobile device Continue Reading
By- Warwick Ashford, Senior analyst
-
Feature
15 Oct 2015
The true cost of a cyber security breach in Australia
The costs of cyber security breaches can quickly add up with fines, reputational damage and overhauls to network security all hitting the coffers. The case of one Australian firm shows why paying a ransom to a hacker might be tempting. Continue Reading
-
News
13 Oct 2015
Cyber security innovation is crucial, says security evangelist
Visibility and automation are key areas of cyber security innovation, but firms should concentrate first on the basics and not overlook the human element of security Continue Reading
By- Warwick Ashford, Senior analyst
-
News
12 Oct 2015
Encryption is a double-edged sword, says Blue Coat
Seven more security suppliers join Blue Coat encrypted traffic management programme amid fresh warnings of attackers using encryption to hide malicious activity Continue Reading
By- Warwick Ashford, Senior analyst
-
News
12 Oct 2015
NHS Health Apps Library to close
The NHS Health Apps Library is shutting down after a two-year tenure, shortly after NHS-approved apps were found to leak data Continue Reading
By -
E-Zine
12 Oct 2015
Europe's data privacy shake-up
In this week's Computer Weekly, after the European Court of Justice ruled the Safe Harbour agreement invalid, we assess the implications for transatlantic data protection. We find out why DVLA has brought its IT back in-house after a 13-year outsourcing deal. And we look at the role of IT in cutting costs in the NHS. Read the issue now. Continue Reading
-
News
09 Oct 2015
Lack of trust for banks causes NHS rethink over government online identity scheme
NHS trials of the Verify ID assurance system found patients concerned over using banks to allow access to medical data Continue Reading
By -
Feature
09 Oct 2015
The security dangers of home networks
Most companies take reasonable steps to protect their networks from virus attacks, but one area of vulnerability that is often overlooked is infection from employees’ home networks Continue Reading
-
Feature
09 Oct 2015
How to ensure strong passwords and better authentication
Five steps to ensure stronger passwords and better authentication to reduce the threat of business data theft Continue Reading
By- Peter Wood, First Base Technologies LLP
-
News
09 Oct 2015
Apple removes more iOS apps over security concerns
Apple has blocked more apps over security concerns just weeks after ridding the App Store of XcodeGhost malware Continue Reading
By- Warwick Ashford, Senior analyst
-
News
08 Oct 2015
Samsung Pay isolated from LoopPay attack
Hackers who compromised LoopPay’s computer systems had no access to Samsung Pay’s user data or other core information, says Samsung Continue Reading
By- Warwick Ashford, Senior analyst
-
News
08 Oct 2015
Estonian government IT initiative increases virtual population
Estonia is leading the way when it comes to providing easy and secure access to government services for citizens and foreigners alike Continue Reading
By- Tarmo Virki
-
News
07 Oct 2015
Singapore and UK researchers investigate privacy in big data era
Academic organisations in Singapore and the UK collaborate on the privacy questions raised by big data and the cloud Continue Reading
By- Tao ai Lei
-
Feature
06 Oct 2015
Max Schrems: The man who broke Safe Harbour
Schrems has persuaded a high court judge to confirm that Edward Snowden’s evidence is acceptable in court and that the US is engaged in mass surveillance of European citizens Continue Reading
By -
Photo Story
06 Oct 2015
Aid organisations using technology to help Syrian refugees in the Middle East
Technology is playing a crucial role in supporting humanitarian aid organisations coping with the influx of Syrian refugees in the Middle East Continue Reading
By -
News
06 Oct 2015
Researchers find credential-stealing webmail server APT attack
Security researchers have discovered a new and unique advanced persistent threat (APT) technique that involves a malicious module loaded onto a webmail server Continue Reading
By- Warwick Ashford, Senior analyst
-
News
05 Oct 2015
Facebook ruling not only landmark data protection case in Europe, say experts
A landmark ruling against Slovakia-based website Weltimmo could impact the Max Schrems case against Facebook and new European data protection rules currently being finalised Continue Reading
By- Warwick Ashford, Senior analyst
-
E-Zine
05 Oct 2015
CW Europe – October 2015
Access to vast amounts of educational resources via the cloud promises much for education. But like in the business world there are fears associated with the cloud. Read the issue now. Continue Reading
-
News
02 Oct 2015
David Jones online customers hit by data breach
Hackers have accessed the personal details of an unknown number of David Jones online customers, but the retailer says payment details and passwords are not affected Continue Reading
By- Warwick Ashford, Senior analyst
-
Feature
01 Oct 2015
How technology is helping deliver aid to Syrian refugees in the Middle East
The Syrian refugee crisis has engulfed the Middle East, but technology is proving to be an essential tool to help aid organisations support displaced people Continue Reading
By -
News
30 Sep 2015
Medical devices must be secure by design, say industry experts
The information security industry is calling for medical device manufacturers to design and build cyber security into all internet-enabled devices after thousands are found to be hackable Continue Reading
By- Warwick Ashford, Senior analyst
-
News
29 Sep 2015
120-day patching gap puts many firms at risk of cyber attack, study shows
The probability of a vulnerability being exploited hits 90% between 40-60 days after discovery, but many firms are taking up to 60 days beyond that to patch, while others are failing to patch at all, a study shows Continue Reading
By- Warwick Ashford, Senior analyst
-
E-Zine
28 Sep 2015
Keeping app pirates at bay
In this week's Computer Weekly, we look at how digital piracy is affecting app developers – and what they can do about it. The man behind the controversial NHS Care.data project has quit – what will it mean for the troubled programme? And we find out how digital disruption is affecting the insurance market. Read the issue now. Continue Reading
-
Feature
25 Sep 2015
How to fully test IT networks for vulnerabilities
Making sure a company network is secure is a very important task, and one that should be scheduled regularly Continue Reading
By -
News
22 Sep 2015
Is Microsoft Office 2016 reliable enough for business?
A day after a major Skype outage, Microsoft unveils Office 2016, which, ironically, offers tight integration with Skype Continue Reading
By- Cliff Saran, Managing Editor
-
E-Zine
21 Sep 2015
How cloud technology helps kittens
In this week's Computer Weekly, we talk to the CIO at the UK's leading animal charity, the RSPCA, about how her cloud-first strategy is helping animal welfare. Microsoft is ending support for older version of Internet Explorer – we assess the implications. And we ask the experts about the best practice in mobile security. Read the issue now. Continue Reading
-
News
21 Sep 2015
Department for Culture, Media and Sport takes over responsibility for data protection policy
Government transfers responsibility for data protection policy and ICO oversight from Ministry of Justice (MOJ) to Department for Culture, Media and Sport (DCMS) Continue Reading
By- Alex Scroxton, Security Editor
-
News
21 Sep 2015
Health chief 'should be held to account' for whistleblow errors
Former nurse and clincial commissioner Bernie Rochford claims unfair dismissal after blowing the whistle on IT problems which put patient care at risk Continue Reading
By- Julia Gregory and Bill Goodwin
-
News
18 Sep 2015
Public-private co-operation in the Nordics tackles growing cyber crime threat
Nordic governments and businesses are putting cyber security at the centre of their planning as threats increase Continue Reading
By -
News
16 Sep 2015
BT launches ethical hacking service for bankers
BT introduces a certified Crest Star ethical hacking test service for financial services customers Continue Reading
By- Alex Scroxton, Security Editor
-
News
15 Sep 2015
Most DDoS attacks hiding something more sinister, Neustar warns
Smaller DDoS attacks can be more dangerous than a powerful attack that knocks a company offline but does not install malware or steal data, warns Neustar Continue Reading
By- Warwick Ashford, Senior analyst
-
News
15 Sep 2015
NHS trust denies bullying and intimidation of IT whistleblower
Managers were already aware of whistleblower's concerns about the accuracy of NHS Southwark's data, tribunal hears Continue Reading
By- Bill Goodwin and Julia Gregory
-
News
14 Sep 2015
RSA Group flags ID theft risk to Lloyds Bank customers following datacentre storage theft
International insurance group has seen 500 customers take up offer of identity theft protection in wake of datacentre theft Continue Reading
By- Caroline Donnelly, Senior Editor, UK
-
News
11 Sep 2015
Security industry welcomes GCHQ password guidelines
GCHQ's guidance on password policy covers some of the most pressing issues facing UK businesses and employees today, according to Skyhigh Networks Continue Reading
By- Warwick Ashford, Senior analyst
-
News
11 Sep 2015
DD4BC cyber extortion gang adds social media to arsenal
Cyber extortion gang DD4BC is using social media campaigns to garner more attention for its ability to create service disruptions by publicly embarrassing large organisations Continue Reading
By- Warwick Ashford, Senior analyst
-
E-Zine
11 Sep 2015
CW Europe – September 2015 edition
Find out the winners of the Computer Weekly European User Awards 2015. The awards aim to shine a light on businesses across Europe that have excelled in their approach to using technology. You can find a full list of winners in this issue and we have highlighted a few through in-depth case studies. Continue Reading
-
News
10 Sep 2015
Researchers discover Android PIN locker ransomware
Researchers say LockerPIN is a self-defending, aggressive piece of ransomware currently targeting Android devices, mainly in the US Continue Reading
By- Warwick Ashford, Senior analyst
-
News
10 Sep 2015
US health insurer Excellus BlueCross BlueShield hit by data breach
Forensic investigation reveals a data breach at US health insurer Excellus BlueCross BlueShield exposing up to 11 million records 21 months after the first intrusion Continue Reading
By- Warwick Ashford, Senior analyst
-
News
10 Sep 2015
Cloudian boosts object storage HyperStore compliance features
Distributed object storage software maker Cloudian upgrades HyperStore with added granularity of data protection features that can help meet compliance requirements Continue Reading
By- Antony Adshead, Storage Editor