Security

RSS FeedSecurity also in this channel

Security Newsletter

Latest News

US agency to seek consensus on divisive, volatile topic of security vulnerability disclosures

The U.S. National Telecommunications and Information Administration will host a series of discussions about the best way to disclose cybersecurity vulnerabilities. read more »

Grsecurity will stop issuing patches citing trademark abuse

A major corporation is misusing grsecurity’s trademarks and violating the terms of the GNU Public License – and as a consequence, the leader of the project said Wednesday, grsecurity will stop making its stable patches available to the general public. read more »

Attention whitehats, The FTC wants you to lead new privacy, security push

The FTC’s PrivacyCon will include brief privacy and security research presentations, along with expert panel discussions on the latest privacy and security challenges facing consumers. Whitehat researchers and academics will discuss the latest security vulnerabilities, explain how they can be exploited to harm consumers, and highlight research affecting consumer privacy and data security. read more »

Researchers find many more modules of Regin spying tool

Security researchers from Symantec have identified 49 more modules of the sophisticated Regin cyberespionage platform that many believe is used by the U.S. National Security Agency and its close allies. read more »

Google to freeze some Adobe Flash content on Sept. 1

Google will stop some Flash content from automatically playing starting Sept. 1, a move it decided on earlier this year to improve browser performance. read more »

more news ..
Advertisement

Lexmark

Navigating storage in a brave new world

Companies must provide a fast and reliable service if they are to remain competitive in a tough business landscape. Find out more


Google Nexus series

Google Nexus series

The latest news, features and slideshows about Google's Nexus series, including the Nexus 4 smartphone and Nexus 10 tablet.


Webcast

Part 2 of your journey to virtualisation

Explore how you can improve your servers, storage and networks by developing your infrastructure.


Windows 8

Windows 8

Check out our latest articles on Microsoft's next-generation operating system.


Features

Spotting fake invoice scams – what UK SMEs need to know

How do you know an invoice is genuine? With great difficulty, it turns out read more »

Are public Wi-Fi hotspots a security risk? Security risks of using public Wi-Fi explained

Public Wi-Fi is used by many to avoid big roaming bills. Can its risks be mitigated? Are public Wi-Fi hotspots a security risk? We examine the security risks of using public Wi-Fi. read more »

Cyber security top CIO concern as Coats re-lists on London Stock Exchange

Chief Information Officer at global manufacturing firm Coats, Richard Cammish, says cyber security was a key concern as the company re-listed on the London Stock Exchange. read more »

Android security in the enterprise - can the worst flaws be fixed?

How do Android's growing list of vulnerabilities affect enterprises and is there much they can do about them? read more »

Porn in Parliament: a problem with people or software?

Were there really 250,000 visits to porn sites in Parliament last year? read more »

more features ..
Most Popular in Security

Are public Wi-Fi hotspots a security risk? Security risks of using public Wi-Fi explained

Public Wi-Fi is used by many to avoid big roaming bills. Can its risks be mitigated?

Cyber security top CIO concern as Coats re-lists on London Stock Exchange

Coats global CIO says organisation had to beef-up cyber security before company re-listing on London Stock Exchange

Securing the enterprise digital footprint

White Papers

Avoiding the 7 Deadly Sins of IT Security

Prevention is more important than detection read more »

What Do You Mean My Cloud Data Isn’t Secure?

Understanding your level of data protection read more »

more white papers ..
Advertisement
Blogs

The Danger Within: When is your company most vulnerable to internal threats?

Too much emphasis is placed on external threats and not enough attention is paid to internal ones.read more »

Security is still paying a high price for sprawl

Mergers and acquisition and corporate 'shiny toy' syndrome created software complexityread more »

more blogs ..
Solution Centres

Securing the Enterprise

Join ComputerworldUK's editor in chief, Mike Simons, and Dell executives in a series of video discussions on how to respond to cyber criminals


HP Data Protection Zone

HP Data Protection Zone

HP Data Protection Zone is your source for software downloads, video, whitepapers and news on how you can keep your business data safe. Read more...


Advertisement

We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message