Microsoft slams external researchers over its own data leak

Microsoft inadvertently leaked customer data after misconfiguring an Azure Blob, but has hit out at the organisation that discovered its error, claiming it is exaggerating the scope of the issue. | Continue reading


@computerweekly.com | 1 year ago

Virtually all vulnerable open source downloads are avoidable

Some 96% of known vulnerable open source downloads could have been avoided altogether, according to a report. | Continue reading


@computerweekly.com | 1 year ago

Skype’s legacy and the rise of the ‘new Nordics’

Estonia and other Baltic states could be part of a ‘new Nordics’ of technology innovation. | Continue reading


@computerweekly.com | 1 year ago

Tech salaries continue to increase as firms search for talent

Firms are increasingly looking for tech candidates, but are employers set to gain more power over hiring over the next year? | Continue reading


@computerweekly.com | 1 year ago

Why don't we take an API-driven approach for our databases as well?

Continue reading


@computerweekly.com | 1 year ago

Accessibility Is Excluding the Neurodivergent

Continue reading


@computerweekly.com | 1 year ago

How the Raspberry Pi flavours professional IT

Continue reading


@computerweekly.com | 2 years ago

Backups ‘no longer effective’ for stopping ransomware attacks

Traditional methods of mitigating ransomware are less efficacious thanks to the rise in double and triple extortion techniques | Continue reading


@computerweekly.com | 2 years ago

Cisco pitches into private 5G, reveals hybrid work technology slate

Comms and collaboration technology services giant introduces new technologies to help businesses rapidly scale networks and digitise operations. | Continue reading


@computerweekly.com | 2 years ago

Saudi Arabia to invest billions of dollars in technology and startups

Saudi Arabia has announced a $6.4bn invested in its tech sector as part of plans to diversify its economy. | Continue reading


@computerweekly.com | 2 years ago

Journalists mined terabytes of offshore data to expose the world’s elites

Six hundred journalists spent over a year mining 2.94 terabytes of data that revealed offshore companies and the politicians, world leaders and celebrities who secretly owned them. | Continue reading


@computerweekly.com | 2 years ago

One in three Norwegian unicorns created in 2021 alone

Norway’s tech sector has undergone rapid growth in the past year, consolidating the Nordic country’s position as an emerging European tech hub. | Continue reading


@computerweekly.com | 2 years ago

Microsoft thwarts mega-DDoS attack on Azure platform

2.4Tbps DDoS attack on an undisclosed Microsoft Azure customer may have been the largest ever attempted against a single target. | Continue reading


@computerweekly.com | 2 years ago

What Norwegians are learning as they pioneer autonomous ships

Norway is leading the world in developing autonomous ship technology and the world should all pay attention to its latest developments. | Continue reading


@computerweekly.com | 2 years ago

Technical debt is holding back innovation

Technical debt is limiting seven in 10 companies in their capacity to innovate, according to a global study. | Continue reading


@computerweekly.com | 2 years ago

A history of cloud computing (2018)

The history of cloud computing starts way back in the 1960s, when an “intergalactic computer network” was first suggested, and in recent years the technology has served to shake-up both the enterprise IT and supplier landscape. | Continue reading


@computerweekly.com | 2 years ago

Claims police have bypassed Parliament with plans for facial-recognition tech

Civil society groups have called for a ban on the use of life facial recognition technology amid claims that the government and the police are introducing intrusive surveillance measures without parliamentary scrutiny. Thirty civil society groups, including Privacy International, … | Continue reading


@computerweekly.com | 2 years ago

Fujitsu uses quantum-inspired algorithm to tackle space waste

A UK Space Agency project is being used to showcase how a quantum-inspired algorithm can work out the best way to manage space debris. | Continue reading


@computerweekly.com | 2 years ago

EncroChat ruling has ‘far-reaching effects’ for legal role of interception

Duncan Campbell and Ian Brown were the only computer forensic expert witnesses for the first evidence review of police use of data hacked during 2020 from the ultra-secure EncroChat phone network, claimed to be dedicated for the use of serious criminals. They assess the impact of … | Continue reading


@computerweekly.com | 2 years ago

DNS Attacks on the Rise in APAC

Attacks on the domain name system in Asia-Pacific grew by 15% last year, with Malaysian organisations seeing the sharpest rise in damages among countries in the region | Continue reading


@computerweekly.com | 2 years ago

Backup appliance specialist Exagrid pays $2.6m to Conti ransomware attackers

Backup appliance specialist hit by Conti ransomware in May with cybercriminals downloading employee and customer data, confidential contracts and source code | Continue reading


@computerweekly.com | 2 years ago

McAfee to change terms of auto-renewing consumer plans

Consumers who found their McAfee antivirus contracts auto-renewed will be able to get out of their contracts and get their money back. | Continue reading


@computerweekly.com | 2 years ago

Fujitsu bosses knew about Post Office Horizon IT flaws, says insider

A former senior developer who worked for Fujitsu on the Post Office IT system that led to subpostmasters being falsely accused of fraud, has claimed bosses knew of fundamental flaws before going live. | Continue reading


@computerweekly.com | 2 years ago

Employers face delicate balancing act as hybrid workforce emerges from lockdown

Study from UK telco advises firms to prepare for the divided demands of the post-lockdown workforce. | Continue reading


@computerweekly.com | 3 years ago

Qualys caught up in Accellion FTA breach

Security services supplier confirms that some of its data was stolen via vulnerabilities in Accellion’s file transfer product. | Continue reading


@computerweekly.com | 3 years ago

It’s time to accept that disinformation is a cyber security issue

Tackling the manipulation of truth and facts is no easy task, and it’s time for the cyber security sector to take up the challenge. | Continue reading


@computerweekly.com | 3 years ago

Converged vs. hyper-converged infrastructure (2017)

Converged and hyper-converged infrastructure are ready-tested ways to put compute and storage into the datacentre. But which should you choose for your deployment? | Continue reading


@computerweekly.com | 3 years ago

LinearB offers A-line to kill off bad code

Continue reading


@computerweekly.com | 3 years ago

Amnesia: IoT flaws dangerous and patches unlikely, say experts

The disclosure of multiple flaws by Forescout has raised big questions for the developers of connected products, and for their users. | Continue reading


@computerweekly.com | 3 years ago

Belgian security researcher hacks Tesla with Raspberry Pi

Belgian security researcher Lennert Wouters once again succeeds in hacking a Tesla vehicle, this time by exploiting the Bluetooth Low Energy standard | Continue reading


@computerweekly.com | 3 years ago

Government must hold technology companies to account on e-waste

MPs urge UK government and global technology companies to deal with “tsunami of electronic waste,” which is throwing away valuable resources vital for building a sustainable future | Continue reading


@computerweekly.com | 3 years ago

Promise CEO: The three pillars of decentralised protocol testing

Continue reading


@computerweekly.com | 3 years ago

Third-party code bug left Instagram users at risk of account takeover

A critical vulnerability in Instagram’s image processing could have allowed attackers to take over not just their victim’s account, but their entire device | Continue reading


@computerweekly.com | 3 years ago

WikiLeaks founder Julian Assange has Asperger’s syndrome and depression

Julian Assange has been diagnosed with Asperger’ severe depression and had other mental health conditions which put him at risk of suicide the court heard. Julian Assange is at high risk of suicide if he is extracted to the US medical experts said during two days of hearings at t … | Continue reading


@computerweekly.com | 3 years ago

Vint Cerf: Why everyone has a role in internet safety

The Covid-19 pandemic has demonstrated the power of internet connectivity. Vint Cerf talks to Computer Weekly about the challenges the internet now faces | Continue reading


@computerweekly.com | 3 years ago

List of Blackbaud breach victims tops 120

More than 120 education and third-sector organisations may have had their data compromised through the breach of Blackbaud’s cloud platform. | Continue reading


@computerweekly.com | 3 years ago

Coronavirus and Cybersecurity

RSA Conference’s programme committee chair talks up the challenges that IT security professionals in APAC are facing to mitigate security risks amid the Covid-19 pandemic | Continue reading


@computerweekly.com | 3 years ago

Chinese law may require companies to disclose cyber-security info outside China

Companies with Chinese operations may have to disclose information about the security of their networks in other countries under China’s draft data security law. | Continue reading


@computerweekly.com | 3 years ago

Can Lady Gaga and Madonna get people to take security seriously?

What does it take to get people to pay attention to cyber security? A celebrity law firm hack may hold some answers. | Continue reading


@computerweekly.com | 3 years ago

Revealed: A man behind the first major computer virus pandemic

After 20 years of silence, Onel de Guzman has admitted unleashing the “Love Bug”, the computer virus that caused havoc by infecting 45 million machines around the world. | Continue reading


@computerweekly.com | 3 years ago

Blogging platform Ghost hacked through Salt vulnerability

Publishing service’s network was taken over by illicit cryptominers after failing to patch a critical vulnerability. | Continue reading


@computerweekly.com | 3 years ago

Amazon deletes employees’ calendar invites to Covid-19 event

Virtual panel organised by Amazon workers after the company fired multiple employees for protesting over work conditions | Continue reading


@computerweekly.com | 4 years ago

Coronavirus: ICO temporarily relaxes regulatory approach

The Information Commissioner’s Office sets out a revised approach to its regulatory duties during the Covid-19 coronavirus pandemic | Continue reading


@computerweekly.com | 4 years ago

Coronavirus: Spain to use artificial intelligence to automate testing

Authorities in Spain have invested in robots to automate the testing of citizens for the Covid-19 coronavirus. | Continue reading


@computerweekly.com | 4 years ago

Most data scientists plan exit in 2020

Survey shows lack of management support is behind a majority of data scientists planning to change jobs next year. | Continue reading


@computerweekly.com | 4 years ago

EU patches 20-year-old open source vulnerability

Ethical hackers taking part in a bug bounty programme on behalf of the European Union have uncovered a 20-year old, previously undiscovered vulnerability | Continue reading


@computerweekly.com | 4 years ago

Bloomberg will move historic trading data to cloud

Bloomberg’s CIO for enterprise, Tony McManus, says its clients’ changing attitude to using cloud is changing the way the firm makes its real-time trading data available to the financial services community. | Continue reading


@computerweekly.com | 4 years ago

Tide Protocol – “Splintering” passwords for greater security

While passwordless security remains just out of reach, a non-profit organisation has developed a mechanism that it says makes passwords exponentially more difficult to crack. | Continue reading


@computerweekly.com | 4 years ago