SecuritySecurity also in this channel
Uber has tweaked one of the features in its app after it was shown to let sensitive trip data become publicly accessible through Google. read more »
While many are hoping that biometric technologies such as fingerprint readers will one day replace cumbersome passwords, the U.S. National Institute of Technology is looking even further out. read more »
Blackberry placed rivalries aside and purchased Good Technology as the phone maker moves further into the mobile security market. read more »
A LinkedIn-based intelligence gathering campaign has been using fake LinkedIn profiles to map out the professional networks of IT security experts. read more »
A new study from Microsoft researchers warns that many types of databases used for electronic medical records are vulnerable to leaking information despite the use of encryption. read more »more news ..
Navigating storage in a brave new world
Companies must provide a fast and reliable service if they are to remain competitive in a tough business landscape. Find out more
The latest news, features and slideshows about Google's Nexus series, including the Nexus 4 smartphone and Nexus 10 tablet.
Explore how you can improve your servers, storage and networks by developing your infrastructure.
Check out our latest articles on Microsoft's next-generation operating system.
Set your filters – some of the new Internet domains are not ones users should visit, even accidentally read more »
How do you know an invoice is genuine? With great difficulty, it turns out read more »
Public Wi-Fi is used by many to avoid big roaming bills. Can its risks be mitigated? Are public Wi-Fi hotspots a security risk? We examine the security risks of using public Wi-Fi. read more »
Chief Information Officer at global manufacturing firm Coats, Richard Cammish, says cyber security was a key concern as the company re-listed on the London Stock Exchange. read more »
How do Android's growing list of vulnerabilities affect enterprises and is there much they can do about them? read more »more features ..
Most Popular in Security
Set your filters – some of the new Internet domains are not ones users should visit, even accidentally
How do you know an invoice is genuine? With great difficulty, it turns out
Too much emphasis is placed on external threats and not enough attention is paid to internal ones.read more »
Mergers and acquisition and corporate 'shiny toy' syndrome created software complexityread more »more blogs ..
Also in galleries :
Join ComputerworldUK's editor in chief, Mike Simons, and Dell executives in a series of video discussions on how to respond to cyber criminals
HP Data Protection Zone is your source for software downloads, video, whitepapers and news on how you can keep your business data safe. Read more...