SecuritySecurity also in this channel
Cybercriminals have developed a Web-based attack tool to hijack routers on a large scale when users visit compromised websites or view malicious advertisements in their browsers. read more »
Cybercriminals are targeting employees who browse the Web or check their email from point-of-sale (PoS) computers, a risky but unfortunately common practice. read more »
Sex dating website spreadsheets reportedly circulating on the dark web read more »
Vendors slow to fix flaw that could allow attackers to undermine security read more »
Possible DDoS attack downed ULCC services for five hours during exam week read more »more news ..
Support for Windows Server 2003 ends in July 2015, ComputerworldUK Editor Mike Simons discusses the migration options with Dell and Microsoft. Find out more
The latest news, features and slideshows about Google's Nexus series, including the Nexus 4 smartphone and Nexus 10 tablet.
Explore how you can improve your servers, storage and networks by developing your infrastructure.
Check out our latest articles on Microsoft's next-generation operating system.
Nigel Hawthorn of Skyhigh Networks offers his advice on meeting the demands of the EU's new data protection regime read more »
The US Department of Homeland Security may be complaining that encryption is interfering with their attempts to eavesdrop on criminals and terrorists -- but they're not the only ones inconvenienced. read more »
There is a firmly held concern in security circles that the automation associated with DevOps moves too swiftly, that security teams and their tests can't keep up, that too many of the metrics measured focus on production, availability, and compliance checkboxes, and as a result, security falls to the wayside. read more »
Nearly every company in the world has thousands of vulnerabilities that hackers can easily exploit. For anyone working in IT, this is not a bombshell announcement. It's business as usual. read more »
Modern mobile technology may have been born with the first iPhone, a quintessential consumer device, but it wasn't long before the business possibilities began to emerge. Fast forward to today, and it's difficult to find a company that hasn't embraced phones and tablets for its employees to some degree. read more »more features ..
Most Popular in Security
Nigel Hawthorn of Skyhigh Networks offers his advice on meeting the demands of the EU's new data protection regime
Governments cry foul over encryption, but enterprises have problems too
Identity and Access Management remain a massive headache for IT security professionalsread more »
A look at how cyberwar affects your organisationread more »more blogs ..
Also in galleries :
Join ComputerworldUK's editor in chief, Mike Simons, and Dell executives in a series of video discussions on how to respond to cyber criminals
HP Data Protection Zone is your source for software downloads, video, whitepapers and news on how you can keep your business data safe. Read more...
Explore the importance of the agile data center to the business, and ideas on how IT can make this transition