SecuritySecurity also in this channel
China claimed on Sunday the U.S. has derailed cybersecurity cooperation between the two countries and that it doesn't tolerate hacking. read more »
Dropbox's file storage service was used for a tricky phishing attack, although the service was quick to shut down it down, according to Symantec. read more »
Users who are careful to download files only from trusted websites may be tricked by a new type of Web vulnerability: this one cons them into downloading malicious executable files that are not actually hosted where they appear to be. read more »more news ..
Join ComputerworldUK'S editor in chief, Mike Simons, and Dell executives in a series of video discussions on how to respond to cyber criminals.
The latest news, features and slideshows about Google's Nexus series, including the Nexus 4 smartphone and Nexus 10 tablet.
Explore how you can improve your servers, storage and networks by developing your infrastructure.
Check out our latest articles on Microsoft's next-generation operating system.
It sounds like the operating system that really needs some serious security patches is the human one. read more »
Data is compromised so frequently these days that it seems like nothing is safe anymore. So one would be forgiven for thinking that using apps that require the user to voluntarily submit payment card information in order to function -- think Venmo, Uber, etc. -- would be a risky play. read more »
It's no longer unusual to see major, massive hacks make news these days. They affect millions of individuals and cost millions of dollars to rectify. read more »
Put simply, cybercrime, especially financial malware, has the potential to be quite the lucrative affair. That's only because the bad guys have the tools to make their work quick and easy, though. read more »
Today, more and more businesses are foregoing the traditional design setup of cubicles and closed-off offices for an open floor plan. read more »more in depth ..
Most Popular in Security
These disgruntled employees show what can happen when an employer wrongs them.
Musicians dominate the 2014 list of celebs you might not want to search on for fear of malware
Experts say training -- done well and frequently -- can make employees much more difficult to 'hack'
After days of critical scrutiny on social media networks, the wireless router that was supposedly a custom-built Tor privacy engine has been suspended by Kickstarter after raising nearly $600,000 in only a few days.
However, there is the possibility that they will be watered down by the time European countries implement them
Are boards getting the advice they need?read more »
If SMEs don't trust the cloud it's because they fail to do due diligenceread more »more blogs ..
Also in slideshows :
Join ComputerworldUK's editor in chief, Mike Simons, and Dell executives in a series of video discussions on how to respond to cyber criminals
HP Data Protection Zone is your source for software downloads, video, whitepapers and news on how you can keep your business data safe. Read more...
View the latest capacity management resources including white papers, videos and news.