We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message

Security

RSS FeedSecurity also in this channel

Security Newsletter

Latest News

SQL injection flaw in Wall Street Journal database led to breach

A vulnerability in a web-based graphics system led to a breach of The Wall Street Journal's network by a hacker, the newspaper acknowledged late Tuesday. read more »

Zero-day flaws in Tails aren't for sale, vulnerability broker says

A company that specializes in selling information on software vulnerabilities has reignited a debate over the handling of such information, especially when it pertains to privacy-focused tools. read more »

Tor Project working to fix weakness that can unmask users

Developers of Tor software believe they've identified a weakness that was scheduled to be revealed at the Black Hat security conference next month that could be used to de-anonymize Tor users. read more »

UK ISPs to tell illegal file-sharers off - with letter in the post

Sky, TalkTalk, BT and Virgin Media will send customers who download illegal files over their network "education letters", the latest initiative in the UK crackdown on online piracy. read more »

Goodwill Industries investigates suspected payment card breach

Goodwill Industries International said Monday federal authorities are investigating a possible payment card breach at its U.S.-based retail outlets. read more »

more news ..
Advertisement
Advertisement

Securing the Enterpise

Join ComputerworldUK'S editor in chief, Mike Simons, and Dell executives in a series of video discussions on how to respond to cyber criminals.


Google Nexus series

Google Nexus series

The latest news, features and slideshows about Google's Nexus series, including the Nexus 4 smartphone and Nexus 10 tablet.


Webcast

Part 2 of your journey to virtualisation

Explore how you can improve your servers, storage and networks by developing your infrastructure.


Windows 8

Windows 8

Check out our latest articles on Microsoft's next-generation operating system.


In Depth

For Your Eyes Only: Corporate espionage using social channels – is your company at risk?

Recent revelations concerning the techniques used by the spy agency, GCHQ to ‘protect’ the UK highlight some of the shadier methods it deploys for online surveillance or to manipulate and distort online discussion. Many of the techniques deployed by GCHQ bear a disturbing resemblance to those used by cyber criminals for their own commercial gain and in corporate espionage. read more »

Wearables: Are we handing more tools to Big Brother?

Most of us would love a break on our health insurance. We would generally appreciate the convenience of seeing ads for things we're actually interested in buying, instead of irrelevant "clutter." A lot of us would like someone, or something, else keeping track of how effective our workouts are. read more »

The CSO of the future

What does the future hold for enterprise security? What will programs, roles, technologies and policies look like in five years or so? read more »

Where culture and security clash

Physical perimeter security can differ from facility to facility, with myriad factors playing into what exactly is implemented, including budget and the assets that are being protected. read more »

Beware the next circle of hell: Unpatchable systems

Insecure by design and trusted by default, embedded systems present security concerns that could prove crippling read more »

more in depth ..
Most Popular in Security

Wearables: Are we handing more tools to Big Brother?

Fitness trackers and other wearables are all the rage, but privacy advocates warn that they come with the risk of a "privacy nightmare"

The 8 scariest digital security stories of 2014 (so far)

The year's only halfway done, but hackers have already filled enough headlines to last a decade.

UK ISPs to tell illegal file-sharers off - with letter in the post

Businesses told to watch out for employees' downloading habits

Almost half UK businesses POS systems are vulnerable to hackers say IT

Majority of UK IT systems are still operating on Windows XP

The CSO of the future

Position yourself and yoru organisation

White Papers

Avoiding the 7 Deadly Sins of IT Security

Prevention is more important than detection read more »

What Do You Mean My Cloud Data Isn’t Secure?

Understanding your level of data protection read more »

more white papers ..
Blogs

The connected car as a microcosm of the new threat landscape

Balancing the excitment of innovation with a security pro's natural cautionread more »

Securing mobile development: Nontechnical solutions

Tools and services are necessary but changing culture is essentialread more »

more blogs ..
Advertisement
ComputerworldUK Poll

Microsoft CEO Satya Nadella says the company's "devices and services" strategy is dead. So, what should Microsoft focus on instead?







Solution Centres

Securing the Enterprise

Join ComputerworldUK's editor in chief, Mike Simons, and Dell executives in a series of video discussions on how to respond to cyber criminals


HP Data Protection Zone

HP Data Protection Zone

HP Data Protection Zone is your source for software downloads, video, whitepapers and news on how you can keep your business data safe. Read more...


Desktop Virtualization Solutions

Accelerate Your IT Efficiency

View the latest capacity management resources including white papers, videos and news.


Advertisement

ComputerworldUK Knowledge Vault

ComputerworldUK
Share
x
Open