SecuritySecurity also in this channel
Email addresses and encrypted passwords of around 97,000 users who tested early builds of the Bugzilla bug tracking software were left exposed for three months following a server migration. read more »
A U.S. Federal Bureau of Investigation spokesman said Wednesday the agency is working with the Secret Service to determine the "scope" of reported cyberattacks against several financial institutions. read more »
A payment card industry security consortium warned retailers on Wednesday of the urgency to secure their systems against "Backoff," a malicious software program that steals card numbers. read more »
Based on data gathered over the first six months of 2014, security researchers from IBM X-Force predict that the number of publicly reported vulnerabilities will drop to under 8,000 this year, a first since 2011. read more »more news ..
Join ComputerworldUK'S editor in chief, Mike Simons, and Dell executives in a series of video discussions on how to respond to cyber criminals.
The latest news, features and slideshows about Google's Nexus series, including the Nexus 4 smartphone and Nexus 10 tablet.
Explore how you can improve your servers, storage and networks by developing your infrastructure.
Check out our latest articles on Microsoft's next-generation operating system.
Put simply, cybercrime, especially financial malware, has the potential to be quite the lucrative affair. That's only because the bad guys have the tools to make their work quick and easy, though. read more »
Today, more and more businesses are foregoing the traditional design setup of cubicles and closed-off offices for an open floor plan. read more »
Getting employees to take security seriously can be a game that everyone wins. read more »
In early July, news circulated that a Chinese manufacturer stood accused of tampering with the firmware of hand-held scanners. read more »
Recent revelations concerning the techniques used by the spy agency, GCHQ to ‘protect’ the UK highlight some of the shadier methods it deploys for online surveillance or to manipulate and distort online discussion. Many of the techniques deployed by GCHQ bear a disturbing resemblance to those used by cyber criminals for their own commercial gain and in corporate espionage. read more »more in depth ..
Most Popular in Security
Don't scoff; rewarding good deeds actually works.
Miller and Valasek hackable car report is causing a stir
The EMV or 'chip-and-PIN' system is not without security flaws, researchers warned
Hacked planes. Unstoppable, utterly malicious flash drives. Hotel automation gone crazy. These are the 10 most terrifying security stories out of the premier hacker and security conferences in Las Vegas.
Google and Facebook market their shared workspace and informality to potential recruits but...
From mobile phones and cars to IPv6, security researchers have turned their skills against a world of technology
The terminology minimises the struggle involved in ensuring end point securityread more »
Rampant Government Surveillance and Increased Regulation Around The Globeread more »more blogs ..
Also in slideshows :
Join ComputerworldUK's editor in chief, Mike Simons, and Dell executives in a series of video discussions on how to respond to cyber criminals
HP Data Protection Zone is your source for software downloads, video, whitepapers and news on how you can keep your business data safe. Read more...
View the latest capacity management resources including white papers, videos and news.