Computer Weekly Feed
A UK government consultation launched today asks whether under-16s should be banned from social media, and age restrictions introduced for VPNs and chatbots
A UK government consultation launched today asks whether under-16s should be banned from social media, and age restrictions introduced for VPNs and chatbots
Categories: Computer Weekly
Anything that expands quickly can attract bubble accusations, and the market for cloud services in an AI age doesn’t look to be different
Anything that expands quickly can attract bubble accusations, and the market for cloud services in an AI age doesn’t look to be different
Categories: Computer Weekly
Executives in the West consistently underestimate technological progress in China - and the country's differing approach to AI development will lead to a significant advantage if Western leaders fail to learn
Executives in the West consistently underestimate technological progress in China - and the country's differing approach to AI development will lead to a significant advantage if Western leaders fail to learn
Categories: Computer Weekly
The UK risks losing its fintech leadership, with open banking progress slow, as countries such as the UAE and India advance rapidly
The UK risks losing its fintech leadership, with open banking progress slow, as countries such as the UAE and India advance rapidly
Categories: Computer Weekly
The Qilin ransomware gang remained ‘top dog’ in January 2026, with over 100 observed cyber attacks to its name, amid a rapidly evolving and fragmenting cyber criminal ecosystem
The Qilin ransomware gang remained ‘top dog’ in January 2026, with over 100 observed cyber attacks to its name, amid a rapidly evolving and fragmenting cyber criminal ecosystem
Categories: Computer Weekly
The Qilin ransomware gang remained 'top dog' in January 2026 with over 100 observed cyber attacks to its name, amid a rapidly evolving, and fragmenting, cyber criminal ecosystem.
The Qilin ransomware gang remained 'top dog' in January 2026 with over 100 observed cyber attacks to its name, amid a rapidly evolving, and fragmenting, cyber criminal ecosystem.
Categories: Computer Weekly
While open source artificial intelligence gained unprecedented recognition during the latest global AI summit, divisions over governance, market concentration and regulatory power cast doubt on whether the technology will benefit society as a whole
While open source artificial intelligence gained unprecedented recognition during the latest global AI summit, divisions over governance, market concentration and regulatory power cast doubt on whether the technology will benefit society as a whole
Categories: Computer Weekly
It used to take two months, but the UK government has reduced the time it takes to address fake DNS redirects
It used to take two months, but the UK government has reduced the time it takes to address fake DNS redirects
Categories: Computer Weekly
Carbon3.ai’s plans for a ‘national grid for AI’ based on renewable energy set to break ground for the first time at Derbyshire landfill site powered by off-grid gas
Carbon3.ai’s plans for a ‘national grid for AI’ based on renewable energy set to break ground for the first time at Derbyshire landfill site powered by off-grid gas
Categories: Computer Weekly
Managing director Bart Holsters explains why hybrid insourcing, competence assurance and sovereign readiness are becoming essential as artificial intelligence pushes datacentres to their limits
Managing director Bart Holsters explains why hybrid insourcing, competence assurance and sovereign readiness are becoming essential as artificial intelligence pushes datacentres to their limits
Categories: Computer Weekly
Bank said artificial intelligence will be fully embedded into the business, personalising customer experiences
Bank said artificial intelligence will be fully embedded into the business, personalising customer experiences
Categories: Computer Weekly
Artificial intelligence developers are accusing Chinese firms of stealing their intellectual property following a spate of ‘distillation attacks’, despite their own alleged theft of training data
Artificial intelligence developers are accusing Chinese firms of stealing their intellectual property following a spate of ‘distillation attacks’, despite their own alleged theft of training data
Categories: Computer Weekly
The NCSC, Cisa, and other Five Eyes agencies have warned of mass exploitation of vulnerabilities in Cisco Catalyst SD-WAN, which Cisco is attributing to an unknown threat actor called UAT-8616
The NCSC, Cisa, and other Five Eyes agencies have warned of mass exploitation of vulnerabilities in Cisco Catalyst SD-WAN, which Cisco is attributing to an unknown threat actor called UAT-8616
Categories: Computer Weekly
The NCSC, Cisa, and other Five Eyes agencies have warned of mass exploitation of vulnerabilities in Cisco Catalyst SD-WAN, which Cisco is attributing to an unknown threat actor called UAT-8616.
The NCSC, Cisa, and other Five Eyes agencies have warned of mass exploitation of vulnerabilities in Cisco Catalyst SD-WAN, which Cisco is attributing to an unknown threat actor called UAT-8616.
Categories: Computer Weekly
The UK government will use new legal powers to lay the groundwork for an under-16 social media ban after its consultation on children’s digital well-being, but opponents warn the measures being considered will only treat the symptoms of the problem if...
The UK government will use new legal powers to lay the groundwork for an under-16 social media ban after its consultation on children’s digital well-being, but opponents warn the measures being considered will only treat the symptoms of the problem if they ignore the structural power of big tech
Categories: Computer Weekly
Atos has taken on its first cohort of apprentices who will become an ‘artificial intelligence-ready’ workforce
Atos has taken on its first cohort of apprentices who will become an ‘artificial intelligence-ready’ workforce
Categories: Computer Weekly
IBM’s X-Force unit observes an uptick in the exploitation of vulnerable public-facing software applications
IBM’s X-Force unit observes an uptick in the exploitation of vulnerable public-facing software applications
Categories: Computer Weekly
Police and MI5 conducted seven unlawful operations to obtain phone data relating to former BBC journalist Vincent Kearney, the Investigatory Powers Tribunal heard today
Police and MI5 conducted seven unlawful operations to obtain phone data relating to former BBC journalist Vincent Kearney, the Investigatory Powers Tribunal heard today
Categories: Computer Weekly
The UK government is to provide the next round of funding to support the Post Office’s move away from its controversial Fujitsu Horizon IT system
The UK government is to provide the next round of funding to support the Post Office’s move away from its controversial Fujitsu Horizon IT system
Categories: Computer Weekly
The payment card services giant leads the way in applying artificial intelligence in its sector, according to research
The payment card services giant leads the way in applying artificial intelligence in its sector, according to research
Categories: Computer Weekly
