SecuritySecurity also in this channel
A decade ago, Microsoft kicked off SDL, or Security Development Lifecycle, a now-widely-adopted process designed to bake security into software, and began building what has become an unmatched reputation in how a vendor writes more secure code, keeps customers informed about security issues, and backs that up with regular patches. read more »
Microsoft has launched a new website to "tell the untold story" of something it believes changed the history of Windows security and indeed Microsoft itself – the Software Development Lifecycle or plain ‘SDL' for short. read more »
Hackers attacked the personal blog of Mt. Gox CEO Mark Karpeles on Sunday and posted what they claim is a ledger showing a balance of some 950,000 bitcoins based on records they obtained from the defunct exchange for the virtual currency. read more »
U.S. retailers are digging in their heels over their need for PIN authentication for Europay MasterCard Visa (EMV) smartcard use here. read more »
With smartphones and tablets increasingly at risk from malware, researchers from North Carolina State University have devised a new and potentially better way to detect it on Android devices. read more »more news ..
Join ComputerworldUK'S editor in chief, Mike Simons, and Dell executives in a series of video discussions on how to respond to cyber criminals.
The latest news, features and slideshows about Google's Nexus series, including the Nexus 4 smartphone and Nexus 10 tablet.
Explore how you can improve your servers, storage and networks by developing your infrastructure.
Check out our latest articles on Microsoft's next-generation operating system.
Nothing spurs malware development like success and that's likely to be the case in the coming months with ransomware. read more »
That someone had to take the fall for the massive breach at Target is neither surprising nor unexpected. The only question is whether more heads will roll in the aftermath of one the biggest data compromises in retail history. read more »
Who says privacy is dead? While it's true that marketers, the government, data aggregators and others are gathering and analyzing more data than ever about every individual, you can still exert some control over what's out there, who's tracking you and what they do with that information. read more »
In the battle between enterprises and malicious hackers, the bad guys are clearly winning, judging by the sheer number of people and exhibitors at the RSA security conference going on here this week. read more »
There has never been a successful catastrophic cyberattack on North America's critical infrastructure (CI) -- yet. read more »more in depth ..
Most Popular in Security
Make sure you avoid the pass phrases on this list
Here are some of the best-known free security tools you can try inside your own network
If you're planning on letting your fingers do the shopping on Monday, here are five tips to help you stay safe
Prevent access with a four-digit PIN code or beware - your device can be hacked!
Hackers make mistakes just as often as anyone else
"We actually had to bus in engineers."
Maximum ICO fine allowed is currently £500,000
Quick steps to improved ID and security management
Vendor competition is getting more fierceread more »
A rapid evolution from the company's anti-virus originsread more »more blogs ..
Also in slideshows :
Join ComputerworldUK's editor in chief, Mike Simons, and Dell executives in a series of video discussions on how to respond to cyber criminals
HP Data Protection Zone is your source for software downloads, video, whitepapers and news on how you can keep your business data safe. Read more...
View the latest capacity management resources including white papers, videos and news.