SecuritySecurity also in this channel
Keylogging malware that may have been used by the NSA shares signficant portions of code with a component of Regin, a sophisticated platform that has been used to spy on businesses, government institutions and private individuals for years. read more »
The Malaysia Airlines website has been attacked and the Lizard Squad, one of the groups that claimed responsibility on Monday, threatened to soon "dump some loot" found on the airline's servers. read more »
A US agency that develops widely used standards for encryption has pledged to be more transparent about its dealings with the National Security Agency, amid concerns the NSA undermined those standards to boost its surveillance efforts. read more »
The Chinese government has denied any involvement in a recent cyber attack against Microsoft's Outlook.com, and it even went as far to accuse a watchdog group of slander for suggesting that the country could be behind it. read more »
Organizations are seeing a sharp increase in attacks using stolen account credentials, with crooks using new techniques to beat fraud detection systems, according to Gartner. read more »more news ..
Support for Windows Server 2003 ends in July 2015, ComputerworldUK Editor Mike Simons discusses the migration options with Dell and Microsoft. Find out more
The latest news, features and slideshows about Google's Nexus series, including the Nexus 4 smartphone and Nexus 10 tablet.
Explore how you can improve your servers, storage and networks by developing your infrastructure.
Check out our latest articles on Microsoft's next-generation operating system.
The overwhelming majority of high-profile US data breaches could have been prevented by sticking to a dozen security practices, according to the Online Trust Alliance (OTA) which has outlined the most critical in a new report. read more »
In an age where data security defenses are getting more and more sophisticated, there will be increased pressure for malicious parties to glean information from within the organization's walls or public places. read more »
Smartphone and tablet users are constantly implored to secure their devices with PINs and other security settings but most rarely venture beyond a simple screen lock. This isn’t enough for reasons that will become clear. If a thief gets hold of a lost or stolen device or tablet there are numerous ways of re-using the handset, accessing any data it contains and even hijacking the account to make expensive calls. read more »
A funny thing is happening in the wake of the Edward Snowden NSA revelations, the infamous iCloud hack of celebrity nude photos, and the hit parade of customer data breaches at Target, Home Depot and the U.S. Postal Service. If it's not the government looking at your data, it's bored, lonely teenagers from the Internet or credit card fraudsters. read more »
Stephen W. Orfei is the incoming general manager of the PCI Security Standards Council. He succeeds the council's first general manager, Bob Russo, who will retire at the end of 2014. Here he speaks to ComputerworldUK'ssister title CSO about hackers, security challenges and efforts to overcome the backwardness of US payment card technologies. read more »more in depth ..
Most Popular in Security
Users trying to reach the airline's website found a graphic from Lizard Squad
OTA non-profit publishes industry best practices
Edward Snowden revelations prompt transparency pledge
Headline-grabbing perhaps but short on substanceread more »
IoT and wearable tech are all the rage at CES but there is an elephant in the roomread more »more blogs ..
Also in slideshows :
Join ComputerworldUK's editor in chief, Mike Simons, and Dell executives in a series of video discussions on how to respond to cyber criminals
HP Data Protection Zone is your source for software downloads, video, whitepapers and news on how you can keep your business data safe. Read more...
Explore the importance of the agile data center to the business, and ideas on how IT can make this transition