SecuritySecurity also in this channel
Google, Dropbox and the Open Technology Fund are supporting a new organization focused on making open-source security and privacy tools more user-friendly. read more »
Apple's iOS 8 addresses a serious weakness that could allow attackers to hijack the wireless network authentication of Apple devices and gain access to enterprise networks. read more »
Mastercard says it has completed a "successful" voice and facial recognition payments trial. read more »
The UK Government has appointed Andy Williams from industry body TechUK as its first ever SME cyber-czar and pumped £4 million into a competition for small firms looking to develop new security technology. read more »
Two online advertising networks, Google's DoubleClick and Zedo, have been delivering malicious advertisements that could install malware on a person's computer, according to the security vendor Malwarebytes. read more »more news ..
Join ComputerworldUK'S editor in chief, Mike Simons, and Dell executives in a series of video discussions on how to respond to cyber criminals.
The latest news, features and slideshows about Google's Nexus series, including the Nexus 4 smartphone and Nexus 10 tablet.
Explore how you can improve your servers, storage and networks by developing your infrastructure.
Check out our latest articles on Microsoft's next-generation operating system.
Data is compromised so frequently these days that it seems like nothing is safe anymore. So one would be forgiven for thinking that using apps that require the user to voluntarily submit payment card information in order to function -- think Venmo, Uber, etc. -- would be a risky play. read more »
It's no longer unusual to see major, massive hacks make news these days. They affect millions of individuals and cost millions of dollars to rectify. read more »
Put simply, cybercrime, especially financial malware, has the potential to be quite the lucrative affair. That's only because the bad guys have the tools to make their work quick and easy, though. read more »
Today, more and more businesses are foregoing the traditional design setup of cubicles and closed-off offices for an open floor plan. read more »
Getting employees to take security seriously can be a game that everyone wins. read more »more in depth ..
Most Popular in Security
Biometrics entering the mainstream
Drawing security SMEs and startups into network
The risks are no greater than transactions involving payment cards
50 people investigated a cyber attack simulated by the intelligence agency
Cripple the automated processes presented by malware platforms and the threats aren't quite so serious
Blogsmore blogs ..
Also in slideshows :
Join ComputerworldUK's editor in chief, Mike Simons, and Dell executives in a series of video discussions on how to respond to cyber criminals
HP Data Protection Zone is your source for software downloads, video, whitepapers and news on how you can keep your business data safe. Read more...
View the latest capacity management resources including white papers, videos and news.