SecuritySecurity also in this channel
Apple on Tuesday began offering an additional security protection for iCloud account users, a move the company made following the theft of nude photos from several celebrities' accounts last month. read more »
Hackers evaded security systems for a year-and-a-half at a hosting center that processed payment cards for Goodwill Industries, using the same type of malware that struck Target and other major retailers to steal card data, according to the charity's software vendor. read more »
The default browser in Android versions older than 4.4 has a vulnerability that allows malicious websites to bypass a critical security mechanism and take control of a user's authenticated sessions on other sites. read more »
The attorney general of the U.S. state of Connecticut is concerned about the privacy implications of Apple Watch's handling of consumers' health information. read more »
A banking trojan, known for its small size but powerful capabilities, has expanded the number of financial institutions it can collect data from, according to security vendor Avast. read more »more news ..
Join ComputerworldUK'S editor in chief, Mike Simons, and Dell executives in a series of video discussions on how to respond to cyber criminals.
The latest news, features and slideshows about Google's Nexus series, including the Nexus 4 smartphone and Nexus 10 tablet.
Explore how you can improve your servers, storage and networks by developing your infrastructure.
Check out our latest articles on Microsoft's next-generation operating system.
Data is compromised so frequently these days that it seems like nothing is safe anymore. So one would be forgiven for thinking that using apps that require the user to voluntarily submit payment card information in order to function -- think Venmo, Uber, etc. -- would be a risky play. read more »
It's no longer unusual to see major, massive hacks make news these days. They affect millions of individuals and cost millions of dollars to rectify. read more »
Put simply, cybercrime, especially financial malware, has the potential to be quite the lucrative affair. That's only because the bad guys have the tools to make their work quick and easy, though. read more »
Today, more and more businesses are foregoing the traditional design setup of cubicles and closed-off offices for an open floor plan. read more »
Getting employees to take security seriously can be a game that everyone wins. read more »more in depth ..
Most Popular in Security
The risks are no greater than transactions involving payment cards
Statistic quirk or a sign of poor filtering?
The errors, which can shut off traffic, are occurring more frequently with little explanation, said Renesys
50 people investigated a cyber attack simulated by the intelligence agency
Cripple the automated processes presented by malware platforms and the threats aren't quite so serious
Blogsmore blogs ..
Also in slideshows :
Join ComputerworldUK's editor in chief, Mike Simons, and Dell executives in a series of video discussions on how to respond to cyber criminals
HP Data Protection Zone is your source for software downloads, video, whitepapers and news on how you can keep your business data safe. Read more...
View the latest capacity management resources including white papers, videos and news.