Alarm raised over ‘trickster’ LokiLocker ransomware
An emergent ransomware-as-a-service (RaaS) family dubbed LokiLocker is beginning to attract the attention of threat researchers, who are warning…
National Cyber Strategy will enhance UK’s cyber power status
The 2022 UK National Cyber Strategy succeeds the previous 2016-2022 Cyber Security Strategy, which was published following the formation…
Ukrainian cyber defences prove resilient
The so-far low-key impact of the ongoing cyber war linked to the conventional war in Ukraine reflects the quality…
Join the dots faster with ready-made ecosystems
From the IBM AS/400 to Microsoft Office, we’ve all seen the benefits of software that is designed for specific…
Dark web littered with Ukraine crypto scammers
An increasing number of fraudulent adverts appearing on the dark web, prompting users to make donations to Ukraine in…
Electronic patient records key to NHS digital transformation
Rolling out electronic patient record (EPR) systems to replace paper-based workflows is key to achieving the government’s plan of…
University of Reading tracks fruit tree flowering as spring breaks, with Oracle
As we approach the Vernal Equinox on 20 March, the University of Reading and Oracle are letting it be…
What happened to performance engineering in the cloud?
Remember when performance was everything? I used to spend days in computer labs testing performance and reporting for tech magazines…
Microsoft emphasizes regex source generation in .NET 7
.NET 7, a planned next generation of Microsoft’s .NET software development platform, has moved to a second preview, with the…
Automation Is Everywhere. But Where Do You Start?
Many organizations are looking at automation as a solution that unlocks value and efficiencies across business processes. However, while the…