SecuritySecurity also in this channel
Governments may need to tighten the regulatory screws on SaaS vendors to make them be more transparent and forthcoming about their security practices. read more »
Malicious advertisements made their way last week to almost two dozen popular websites and used browser-based exploits to infect computers with CryptoWall, a nasty file-encrypting ransomware program. read more »
A malicious Android app that takes over the screen of devices and extorts money from users with fake notifications from law enforcement agencies was recently updated with a component that allows it to spread via text message spam. read more »
Just after Apple's iCloud service faced a hacking attack from China, Apple CEO Tim Cook met with a Chinese official on Wednesday to discuss protecting users' privacy. read more »more news ..
Join ComputerworldUK'S editor in chief, Mike Simons, and Dell executives in a series of video discussions on how to respond to cyber criminals.
The latest news, features and slideshows about Google's Nexus series, including the Nexus 4 smartphone and Nexus 10 tablet.
Explore how you can improve your servers, storage and networks by developing your infrastructure.
Check out our latest articles on Microsoft's next-generation operating system.
It sounds like the operating system that really needs some serious security patches is the human one. read more »
Data is compromised so frequently these days that it seems like nothing is safe anymore. So one would be forgiven for thinking that using apps that require the user to voluntarily submit payment card information in order to function -- think Venmo, Uber, etc. -- would be a risky play. read more »
It's no longer unusual to see major, massive hacks make news these days. They affect millions of individuals and cost millions of dollars to rectify. read more »
Put simply, cybercrime, especially financial malware, has the potential to be quite the lucrative affair. That's only because the bad guys have the tools to make their work quick and easy, though. read more »
Today, more and more businesses are foregoing the traditional design setup of cubicles and closed-off offices for an open floor plan. read more »more in depth ..
Most Popular in Security
Use of monitoring equipment must be 'necessary and proportionate'
Consumers should have a say in how their data is collected
These disgruntled employees show what can happen when an employer wrongs them.
Musicians dominate the 2014 list of celebs you might not want to search on for fear of malware
Experts say training -- done well and frequently -- can make employees much more difficult to 'hack'
Are boards getting the advice they need?read more »
If SMEs don't trust the cloud it's because they fail to do due diligenceread more »more blogs ..
Also in slideshows :
Join ComputerworldUK's editor in chief, Mike Simons, and Dell executives in a series of video discussions on how to respond to cyber criminals
HP Data Protection Zone is your source for software downloads, video, whitepapers and news on how you can keep your business data safe. Read more...
View the latest capacity management resources including white papers, videos and news.