Search Computerworld UK

Search Computerworld UK website for

Here are some of our latest articles from the last few days


Order results by relevancy / date

Blackberry buys Good Technology as it further expands into mobile device security

Blackberry placed rivalries aside and purchased Good Technology as the phone maker moves further into the mobile security market.
More Like This

LinkedIn-based intelligence gathering campaign targets the security industry

A LinkedIn-based intelligence gathering campaign has been using fake LinkedIn profiles to map out the professional networks of IT security experts.
More Like This

Even encrypted medical record databases leak information

A new study from Microsoft researchers warns that many types of databases used for electronic medical records are vulnerable to leaking information despite the use of encryption.
More Like This

DOJ tightens policies on use of simulated cells for surveillance

The U.S. Department of Justice has issued new guidelines on the use of a cellular surveillance technology called stingrays.
More Like This

FTC finds privacy disclosures improved in kid's apps

Mobile applications aimed at children are doing a better job in recent years of disclosing their privacy practices, but many apps still lack basic information, according to a U.S. Federal Trade Commission survey.
More Like This

Uber ride data publicly accessible through Google

On Thursday, a site-specific search on Google for trip.uber.com produced dozens of links to Uber rides that have been completed and cancelled, in countries around the world including the U.S., England, Russia, France and Mexico.
More Like This

The 10 riskiest Internet domains firewall admins should block

Set your filters – some of the new Internet domains are not ones users should visit, even accidentally
More Like This

Cisco security chief: 4 things CISOs need to survive

Cisco’s security consulting chief James Mobley outlines four areas CISOs need to develop their skills in order to keep up with the rapidly changing needs of corporate security.
More Like This

Shopperz adware takes local DNS hijacking to the next level

The Shopperz adware program uses a cunning technique to make DNS (Domain Name System) hijacking harder to detect and fix.
More Like This

CSVed 2.3.3

View, search, edit and convert CSV files
More Like This

Start10 v1.01

An alternative Start menu for Windows 10
More Like This

ACLU urges court to block NSA's continued phone records collection

The American Civil Liberties Union is taking the NSA back to court over its data collection practices.
More Like This

Paid endorsements get Xbox One marketer in trouble with FTC

Online entertainment network Machinima has reached a settlement with the U.S. Federal Trade Commission for failing to disclose it paid people to produce endorsement videos for the Xbox One gaming console.
More Like This

Microsoft bulks up Azure virtual machines

The new Microsoft Azure GS-series virtual machines are made for demanding database-driven workloads.
More Like This

Despite reports of hacking, baby monitors remain woefully insecure

A security analysis of nine baby monitors from different manufacturers revealed serious vulnerabilities and design flaws that could allow hackers to hijack their video feeds or take full control of the devices.
More Like This



We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message