Microsoft inadvertently leaked customer data after misconfiguring an Azure Blob, but has hit out at the organisation that discovered its error, claiming it is exaggerating the scope of the issue. | Continue reading
Some 96% of known vulnerable open source downloads could have been avoided altogether, according to a report. | Continue reading
Estonia and other Baltic states could be part of a ‘new Nordics’ of technology innovation. | Continue reading
Firms are increasingly looking for tech candidates, but are employers set to gain more power over hiring over the next year? | Continue reading
Traditional methods of mitigating ransomware are less efficacious thanks to the rise in double and triple extortion techniques | Continue reading
Comms and collaboration technology services giant introduces new technologies to help businesses rapidly scale networks and digitise operations. | Continue reading
Saudi Arabia has announced a $6.4bn invested in its tech sector as part of plans to diversify its economy. | Continue reading
Six hundred journalists spent over a year mining 2.94 terabytes of data that revealed offshore companies and the politicians, world leaders and celebrities who secretly owned them. | Continue reading
Norway’s tech sector has undergone rapid growth in the past year, consolidating the Nordic country’s position as an emerging European tech hub. | Continue reading
2.4Tbps DDoS attack on an undisclosed Microsoft Azure customer may have been the largest ever attempted against a single target. | Continue reading
Norway is leading the world in developing autonomous ship technology and the world should all pay attention to its latest developments. | Continue reading
Technical debt is limiting seven in 10 companies in their capacity to innovate, according to a global study. | Continue reading
The history of cloud computing starts way back in the 1960s, when an “intergalactic computer network” was first suggested, and in recent years the technology has served to shake-up both the enterprise IT and supplier landscape. | Continue reading
Civil society groups have called for a ban on the use of life facial recognition technology amid claims that the government and the police are introducing intrusive surveillance measures without parliamentary scrutiny. Thirty civil society groups, including Privacy International, … | Continue reading
A UK Space Agency project is being used to showcase how a quantum-inspired algorithm can work out the best way to manage space debris. | Continue reading
Duncan Campbell and Ian Brown were the only computer forensic expert witnesses for the first evidence review of police use of data hacked during 2020 from the ultra-secure EncroChat phone network, claimed to be dedicated for the use of serious criminals. They assess the impact of … | Continue reading
Attacks on the domain name system in Asia-Pacific grew by 15% last year, with Malaysian organisations seeing the sharpest rise in damages among countries in the region | Continue reading
Backup appliance specialist hit by Conti ransomware in May with cybercriminals downloading employee and customer data, confidential contracts and source code | Continue reading
Consumers who found their McAfee antivirus contracts auto-renewed will be able to get out of their contracts and get their money back. | Continue reading
A former senior developer who worked for Fujitsu on the Post Office IT system that led to subpostmasters being falsely accused of fraud, has claimed bosses knew of fundamental flaws before going live. | Continue reading
Study from UK telco advises firms to prepare for the divided demands of the post-lockdown workforce. | Continue reading
Security services supplier confirms that some of its data was stolen via vulnerabilities in Accellion’s file transfer product. | Continue reading
Tackling the manipulation of truth and facts is no easy task, and it’s time for the cyber security sector to take up the challenge. | Continue reading
Converged and hyper-converged infrastructure are ready-tested ways to put compute and storage into the datacentre. But which should you choose for your deployment? | Continue reading
The disclosure of multiple flaws by Forescout has raised big questions for the developers of connected products, and for their users. | Continue reading
Belgian security researcher Lennert Wouters once again succeeds in hacking a Tesla vehicle, this time by exploiting the Bluetooth Low Energy standard | Continue reading
MPs urge UK government and global technology companies to deal with “tsunami of electronic waste,” which is throwing away valuable resources vital for building a sustainable future | Continue reading
A critical vulnerability in Instagram’s image processing could have allowed attackers to take over not just their victim’s account, but their entire device | Continue reading
Julian Assange has been diagnosed with Asperger’ severe depression and had other mental health conditions which put him at risk of suicide the court heard. Julian Assange is at high risk of suicide if he is extracted to the US medical experts said during two days of hearings at t … | Continue reading
The Covid-19 pandemic has demonstrated the power of internet connectivity. Vint Cerf talks to Computer Weekly about the challenges the internet now faces | Continue reading
More than 120 education and third-sector organisations may have had their data compromised through the breach of Blackbaud’s cloud platform. | Continue reading
RSA Conference’s programme committee chair talks up the challenges that IT security professionals in APAC are facing to mitigate security risks amid the Covid-19 pandemic | Continue reading
Companies with Chinese operations may have to disclose information about the security of their networks in other countries under China’s draft data security law. | Continue reading
What does it take to get people to pay attention to cyber security? A celebrity law firm hack may hold some answers. | Continue reading
After 20 years of silence, Onel de Guzman has admitted unleashing the “Love Bug”, the computer virus that caused havoc by infecting 45 million machines around the world. | Continue reading
Publishing service’s network was taken over by illicit cryptominers after failing to patch a critical vulnerability. | Continue reading
Virtual panel organised by Amazon workers after the company fired multiple employees for protesting over work conditions | Continue reading
The Information Commissioner’s Office sets out a revised approach to its regulatory duties during the Covid-19 coronavirus pandemic | Continue reading
Authorities in Spain have invested in robots to automate the testing of citizens for the Covid-19 coronavirus. | Continue reading
Survey shows lack of management support is behind a majority of data scientists planning to change jobs next year. | Continue reading
Ethical hackers taking part in a bug bounty programme on behalf of the European Union have uncovered a 20-year old, previously undiscovered vulnerability | Continue reading
Bloomberg’s CIO for enterprise, Tony McManus, says its clients’ changing attitude to using cloud is changing the way the firm makes its real-time trading data available to the financial services community. | Continue reading
While passwordless security remains just out of reach, a non-profit organisation has developed a mechanism that it says makes passwords exponentially more difficult to crack. | Continue reading