SecuritySecurity also in this channel
Some Android apps thought to be vulnerable to the Heartbleed bug were spared because of a common coding error in the way they implemented their own native OpenSSL library. read more »
The panic over the Heartbleed bug is proving to be a convenient distraction for hackers using standard techniques in a fresh wave of attacks targeting at least 18 U.S. universities, according to a computer security researcher. read more »
Apple today issued a security-only update for OS X, patching 25 vulnerabilities in Mavericks, its newest operating system, and 7 bugs in older editions. read more »
A battle for rights to U.S. airspace is brewing between the Federal Aviation Administration and organizations looking to operate small, unmanned aerial vehicles, or drones, for commercial and other purposes. read more »
In our daily activities, our smartphones increasingly store or access sensitive business and personal data -- not just email, but also financial and medical information, company systems, travel itineraries, etc. Many of us also use smartphones to access cloud data repositories like Dropbox, Evernote, Google Docs, Microsoft OneDrive and Apple iCloud. read more »more news ..
Join ComputerworldUK'S editor in chief, Mike Simons, and Dell executives in a series of video discussions on how to respond to cyber criminals.
The latest news, features and slideshows about Google's Nexus series, including the Nexus 4 smartphone and Nexus 10 tablet.
Explore how you can improve your servers, storage and networks by developing your infrastructure.
Check out our latest articles on Microsoft's next-generation operating system.
CSOs need to take a number of steps as soon as possible to protect their organizations against the OpenSSL vulnerability that has shaken the tech industry, experts say. read more »
Microsoft's operating system becomes open to attack read more »
As a security manager, I expect my company to be hit by malware infestations, data theft, denial-of-service attacks and attempts at unauthorised access. I deal with them all as they arise, and they do keep things interesting. read more »
When considering the alarming number of mega-data breaches and other such security incidents as they occur almost daily, and then compare the announced "root causes" and "used attack paths" of the incidents with the current state-of-the-art strategies to defend against attacks, I have come to conclusion that, unfortunately, security (risk, audit, and compliance, and any other assurance functions) is more often than not only "cementing" the status quo, that is the currently used processes or ways of doing business in a somewhat "secure" fashion. read more »
Nothing spurs malware development like success and that's likely to be the case in the coming months with ransomware. read more »more in depth ..
Most Popular in Security
Basic steps for IT CIOs, CISOs and IT Directors to take now
Prevent access with a four-digit PIN code or beware - your device can be hacked!
Hackers make mistakes just as often as anyone else
Regulator to focus on individual banks’ security systems
Adrian Leppard explains how the forces are tackling the growing threat posed by cyber criminals
City of London Police's Pipcu unit are hot on the heels of file-sharing sites
Quick steps to improved ID and security management
These companies are tackling today's biggest security issues, from cloud security to authentication to mobile device management - See more at: http://www.infoworld.com/slideshows#sthash.woGoAN8P.dpuf
Marketers Need Help Managing Riskread more »
But ignoring the usability vulnerabilitiesread more »more blogs ..
Also in slideshows :
Join ComputerworldUK's editor in chief, Mike Simons, and Dell executives in a series of video discussions on how to respond to cyber criminals
HP Data Protection Zone is your source for software downloads, video, whitepapers and news on how you can keep your business data safe. Read more...
View the latest capacity management resources including white papers, videos and news.