SecuritySecurity also in this channel
Flintshire County Council in North Wales is deploying an encrypted email system that will make it possible to secure messages sent to recipients both inside and outside the organisation. read more »
GCHQ has announced a ten-week ‘cyber insiders summer school’ for aspiring white hat hackers, the latest attempt by the Government security organisation to uncover the next generation of British cyber-talent. read more »
China is scratching its head over why the U.S. is opposing a new anti-terror law relating to cybersurveillance when the U.S. and other countries have also requested that tech companies hand over data to help stop terrorists. read more »
Leaked documents show that the European Union's data protection is on its way to become an empty shell devoid of meaning, European civil rights groups warned Tuesday. read more »
D-Link issued fixes on Monday for flaws that could allow remote access to one of its routers, and will patch several other models in the coming week. read more »more news ..
Support for Windows Server 2003 ends in July 2015, ComputerworldUK Editor Mike Simons discusses the migration options with Dell and Microsoft. Find out more
The latest news, features and slideshows about Google's Nexus series, including the Nexus 4 smartphone and Nexus 10 tablet.
Explore how you can improve your servers, storage and networks by developing your infrastructure.
Check out our latest articles on Microsoft's next-generation operating system.
It’s been almost five years since the discovery of Stuxnet disabused the world of its naivety about nation state malware but since then more attention has been paid to Edward Snowden’s NSA hacking revelations than the occasional technical insights into old-style spying software. read more »
At a time when physical money makes up a shrinking 8 percent of the currency in circulation, the ATM has become a reminder that people still love taking paper money out of holes in the wall. According to a Kaspersky Lab investigation, leaked to the New York Times at the weekend, we have been reminded that some of the technology’s biggest fans turn out to be criminals. read more »
Like the internet, cybercrime is here to stay and we have to learn to live with it. That means looking afresh at the technological, procedural and regulatory steps needed to ensure cyber-security. read more »
The overwhelming majority of high-profile US data breaches could have been prevented by sticking to a dozen security practices, according to the Online Trust Alliance (OTA) which has outlined the most critical in a new report. read more »
In an age where data security defenses are getting more and more sophisticated, there will be increased pressure for malicious parties to glean information from within the organization's walls or public places. read more »more in depth ..
Most Popular in Security
No dress code but must code
Experts agree firmware attacks are possible. But until the Equation group report nobody was worried
New board packed with private equity people
And still the bank industry keeps quiet
Time to phase out passwordsread more »
Recent bank malware attacks are telling us that security through obscurity is no longer enoughread more »more blogs ..
Also in slideshows :
Join ComputerworldUK's editor in chief, Mike Simons, and Dell executives in a series of video discussions on how to respond to cyber criminals
HP Data Protection Zone is your source for software downloads, video, whitepapers and news on how you can keep your business data safe. Read more...
Explore the importance of the agile data center to the business, and ideas on how IT can make this transition