AI vs. you: Who’s better at permission decisions?

A single tap on a permission prompt can decide how far an app reaches into a user’s personal data. Most of these calls happen during installation. The number of... Read more »

Western coalition supplying tech to Ukraine prepared for long war

Russia is deploying hybrid warfare against Europe as western nations supply critical IT and telecoms equipment to Ukraine’s front line Read more »

The quantum clock is ticking and businesses are still stuck in prep mode

Quantum computing is still years away from breaking current encryption, but many security teams are already worried about what happens when that moment arrives. A new report from the... Read more »

India Scraps Mandatory App Preinstall Following Industry Pushback

The reversal comes just 48 hours after reports surfaced that Apple refused to comply with the order to preload the government’s Sanchar Saathi app. The post India Scraps Mandatory... Read more »

King Addons flaw lets anyone become WordPress admin

Hackers are exploiting a King Addons flaw (CVE-2025-8489) that lets anyone register and instantly gain admin privileges on WordPress sites. Hackers are exploiting a critical vulnerability, tracked as CVE-2025-8489... Read more »

University of Pennsylvania and University of Phoenix disclose data breaches

The University of Pennsylvania and the University of Phoenix confirm they were hit in the Oracle E-Business Suite hacking campaign. The University of Pennsylvania (Penn) and the University of... Read more »

In 2026, collaboration, honesty and humility in cyber are key

As we prepare to close out 2025, the Computer Weekly Security Think Tank panel looks back at the past year, and ahead to 2026. Read more »

UK government pledges to rewrite Computer Misuse Act

Campaigners celebrate as security minister Dan Jarvis commits to amending the outdated Computer Misuse Act to protect security professionals from prosecution. Read more »

NCSC and BT block a billion dangerous clicks

A protective service jointly-developed by the NCSC and BT has disrupted over a billion potential cyber incidents by stopping members of the public from clicking through to dangerous websites. Read more »

Salt Security identifies external misuse and abuse of MCP servers by AI agents

Salt Security announced it is extending its API behavioral threat protection to detect and block malicious intent targeting Model Context Protocol (MCP) servers deployed within the AWS ecosystem. Building... Read more »
Subscribe to our Newsletter