SecuritySecurity also in this channel
Home Depot said Tuesday it was investigating a possible breach of its systems holding customer payment information tied to credit and debit cards. read more »
A targeted attack focused on user names, passwords and security questions of Apple accounts gave hackers access to nude photos of celebrities that were then leaked over the weekend on the Internet, the company said Tuesday. read more »
Cybercriminals are increasingly infecting computers with malware that resides only in memory in order to make their attacks harder to detect. read more »
A funny thing happened on the Internet Sunday as a cache of nude photos of Kate Upton, Jennifer Lawrence, and other big-name stars made their way onto 4chan, as BuzzFeed notes. Reports indicate that this leak may have been the result of a hacker (or hackers) taking advantage of a flaw in Apple's iCloud service. read more »more news ..
Join ComputerworldUK'S editor in chief, Mike Simons, and Dell executives in a series of video discussions on how to respond to cyber criminals.
The latest news, features and slideshows about Google's Nexus series, including the Nexus 4 smartphone and Nexus 10 tablet.
Explore how you can improve your servers, storage and networks by developing your infrastructure.
Check out our latest articles on Microsoft's next-generation operating system.
It's no longer unusual to see major, massive hacks make news these days. They affect millions of individuals and cost millions of dollars to rectify. read more »
Put simply, cybercrime, especially financial malware, has the potential to be quite the lucrative affair. That's only because the bad guys have the tools to make their work quick and easy, though. read more »
Today, more and more businesses are foregoing the traditional design setup of cubicles and closed-off offices for an open floor plan. read more »
Getting employees to take security seriously can be a game that everyone wins. read more »
In early July, news circulated that a Chinese manufacturer stood accused of tampering with the firmware of hand-held scanners. read more »more in depth ..
Most Popular in Security
Don't scoff; rewarding good deeds actually works.
Holds hostage a staggering 5.25 billion files
The attackers are likely using a large list of credentials compiled by a Russian gang, Namecheap said
Hacked planes. Unstoppable, utterly malicious flash drives. Hotel automation gone crazy. These are the 10 most terrifying security stories out of the premier hacker and security conferences in Las Vegas.
Cripple the automated processes presented by malware platforms and the threats aren't quite so serious
From mobile phones and cars to IPv6, security researchers have turned their skills against a world of technology
Blogsmore blogs ..
Also in slideshows :
Join ComputerworldUK's editor in chief, Mike Simons, and Dell executives in a series of video discussions on how to respond to cyber criminals
HP Data Protection Zone is your source for software downloads, video, whitepapers and news on how you can keep your business data safe. Read more...
View the latest capacity management resources including white papers, videos and news.