SecuritySecurity also in this channel
About 2.6 million payment cards at Michaels Stores and another 400,000 at subsidiary Aaron Brothers may have been affected in a card skimming attack that compromised its point-of-sale systems, the retailer said Thursday. read more »
National security may be at stake as private businesses try to manage a growing number of cyberthreats, but IT professionals shouldn't have to bear that burden alone. read more »
Worried about how the Heartbleed vulnerability may affect your personal accounts? A new tool may be of help. read more »
The Tor Project has flagged 380 Tor relays vulnerable to the critical Heartbleed flaw to be rejected from the Tor anonymity network, reducing the network's entry and exit capacity. read more »
Almost 500,000 patient records have been hacked from the servers of the Harley Medical Group, the plastic surgery firm which has clinics across the UK. read more »more news ..
Join ComputerworldUK'S editor in chief, Mike Simons, and Dell executives in a series of video discussions on how to respond to cyber criminals.
The latest news, features and slideshows about Google's Nexus series, including the Nexus 4 smartphone and Nexus 10 tablet.
Explore how you can improve your servers, storage and networks by developing your infrastructure.
Check out our latest articles on Microsoft's next-generation operating system.
CSOs need to take a number of steps as soon as possible to protect their organizations against the OpenSSL vulnerability that has shaken the tech industry, experts say. read more »
Microsoft's operating system becomes open to attack read more »
As a security manager, I expect my company to be hit by malware infestations, data theft, denial-of-service attacks and attempts at unauthorised access. I deal with them all as they arise, and they do keep things interesting. read more »
When considering the alarming number of mega-data breaches and other such security incidents as they occur almost daily, and then compare the announced "root causes" and "used attack paths" of the incidents with the current state-of-the-art strategies to defend against attacks, I have come to conclusion that, unfortunately, security (risk, audit, and compliance, and any other assurance functions) is more often than not only "cementing" the status quo, that is the currently used processes or ways of doing business in a somewhat "secure" fashion. read more »
Nothing spurs malware development like success and that's likely to be the case in the coming months with ransomware. read more »more in depth ..
Most Popular in Security
Two-fifths plan to up spending to meet growing threat
Fighting cyber crime is a ‘never-ending battle’, says CEO Dimon
Basic steps for IT CIOs, CISOs and IT Directors to take now
Prevent access with a four-digit PIN code or beware - your device can be hacked!
Hackers make mistakes just as often as anyone else
From Microsoft and Cisco to the National Institute of Standards and Technology, we look at some of the most useful IT security websites
Adrian Leppard explains how the forces are tackling the growing threat posed by cyber criminals
Here are some of the best-known free security tools you can try inside your own network
Marketers Need Help Managing Riskread more »
But ignoring the usability vulnerabilitiesread more »more blogs ..
Also in slideshows :
Join ComputerworldUK's editor in chief, Mike Simons, and Dell executives in a series of video discussions on how to respond to cyber criminals
HP Data Protection Zone is your source for software downloads, video, whitepapers and news on how you can keep your business data safe. Read more...
View the latest capacity management resources including white papers, videos and news.