We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message

Security

RSS FeedSecurity also in this channel

Security Newsletter

Latest News

Retailers warned to act now to protect against Backoff malware

read more »

Vulnerabilities on the decline, but risk assessment is often flawed, study says says

Based on data gathered over the first six months of 2014, security researchers from IBM X-Force predict that the number of publicly reported vulnerabilities will drop to under 8,000 this year, a first since 2011. read more »

New malvertising campaign hit visitors of several high-profile sites

Some visitors to several high-profile websites last week were redirected to browser exploits that installed malware on their computers because of malicious advertisements on those sites. read more »

Betfair deploys new anti-fraud system from Sphonic

Online betting and gaming company Betfair is using Sphonic’s identity and risk management solution, which will be used to help prevent fraud. read more »

Netflix open sources internal threat monitoring tools

Netflix has released three internal tools it uses to catch hints on the Web that hackers might target its services. read more »

more news ..
Advertisement

Securing the Enterpise

Join ComputerworldUK'S editor in chief, Mike Simons, and Dell executives in a series of video discussions on how to respond to cyber criminals.


Google Nexus series

Google Nexus series

The latest news, features and slideshows about Google's Nexus series, including the Nexus 4 smartphone and Nexus 10 tablet.


Webcast

Part 2 of your journey to virtualisation

Explore how you can improve your servers, storage and networks by developing your infrastructure.


Windows 8

Windows 8

Check out our latest articles on Microsoft's next-generation operating system.


In Depth

Kicking the stool out from under the cybercrime economy

Put simply, cybercrime, especially financial malware, has the potential to be quite the lucrative affair. That's only because the bad guys have the tools to make their work quick and easy, though. read more »

Is the open plan office a data security headache?

Today, more and more businesses are foregoing the traditional design setup of cubicles and closed-off offices for an open floor plan. read more »

Boost your security training with gamification

Getting employees to take security seriously can be a game that everyone wins. read more »

ERP security: Protecting the pipeline by focusing on business-critical platforms

In early July, news circulated that a Chinese manufacturer stood accused of tampering with the firmware of hand-held scanners. read more »

For Your Eyes Only: Corporate espionage using social channels – is your company at risk?

Recent revelations concerning the techniques used by the spy agency, GCHQ to ‘protect’ the UK highlight some of the shadier methods it deploys for online surveillance or to manipulate and distort online discussion. Many of the techniques deployed by GCHQ bear a disturbing resemblance to those used by cyber criminals for their own commercial gain and in corporate espionage. read more »

more in depth ..
Most Popular in Security

Boost your security training with gamification

Don't scoff; rewarding good deeds actually works.

The 10 most terrifying security nightmares revealed at the Black Hat and Def Con hacker conferences

Hacked planes. Unstoppable, utterly malicious flash drives. Hotel automation gone crazy. These are the 10 most terrifying security stories out of the premier hacker and security conferences in Las Vegas.

Ministry of Justice fined over loss of unencrypted hard drive

Repeat offence 'beggars belief' as prison service didn’t realise encryption function had to be switched on

Is the open plan office a data security headache?

Google and Facebook market their shared workspace and informality to potential recruits but...

Black Hat 2014: How to crack just about everything

From mobile phones and cars to IPv6, security researchers have turned their skills against a world of technology

CryptoLocker's UK victims escape malware's clutches with backups

No ransoms paid, says Oughtred and Harrison

White Papers

Avoiding the 7 Deadly Sins of IT Security

Prevention is more important than detection read more »

What Do You Mean My Cloud Data Isn’t Secure?

Understanding your level of data protection read more »

more white papers ..
Blogs

Say 'small footprint' again. I dare you

The terminology minimises the struggle involved in ensuring end point securityread more »

Forrester's 2014 Data Privacy Heat Map

Rampant Government Surveillance and Increased Regulation Around The Globeread more »

more blogs ..
Advertisement
ComputerworldUK Poll

Microsoft CEO Satya Nadella says the company's "devices and services" strategy is dead. So, what should Microsoft focus on instead?







Solution Centres

Securing the Enterprise

Join ComputerworldUK's editor in chief, Mike Simons, and Dell executives in a series of video discussions on how to respond to cyber criminals


HP Data Protection Zone

HP Data Protection Zone

HP Data Protection Zone is your source for software downloads, video, whitepapers and news on how you can keep your business data safe. Read more...


Desktop Virtualization Solutions

Accelerate Your IT Efficiency

View the latest capacity management resources including white papers, videos and news.


Advertisement

ComputerworldUK Knowledge Vault

ComputerworldUK
Share
x
Open