SecuritySecurity also in this channel
Nuclear Regulatory Commission employees were tricked into disclosing passwords and downloading malware in three phishing attacks that occurred over a three-year period. read more »
A type of malware called Reveton, which falsely warns users they've broken the law and demands payment of a fine, has been upgraded with powerful password stealing functions, according to Avast. read more »
The data breach at Community Health Systems that exposed the personal information on more than 4.5 million people is a symptom of the chronic lack of attention to patient data security and privacy within the healthcare industry. read more »
Nearly all of Facebook's outbound notification emails are now encrypted while traveling the Internet, a collaborative feat that comes from the technology industry's push to thwart the NSA's spying programs. read more »
Most technology pros charged with maintaining compliance at tightly regulated healthcare, retail and financial organisations admit they are failing. read more »more news ..
Join ComputerworldUK'S editor in chief, Mike Simons, and Dell executives in a series of video discussions on how to respond to cyber criminals.
The latest news, features and slideshows about Google's Nexus series, including the Nexus 4 smartphone and Nexus 10 tablet.
Explore how you can improve your servers, storage and networks by developing your infrastructure.
Check out our latest articles on Microsoft's next-generation operating system.
Getting employees to take security seriously can be a game that everyone wins. read more »
In early July, news circulated that a Chinese manufacturer stood accused of tampering with the firmware of hand-held scanners. read more »
Recent revelations concerning the techniques used by the spy agency, GCHQ to ‘protect’ the UK highlight some of the shadier methods it deploys for online surveillance or to manipulate and distort online discussion. Many of the techniques deployed by GCHQ bear a disturbing resemblance to those used by cyber criminals for their own commercial gain and in corporate espionage. read more »
Most of us would love a break on our health insurance. We would generally appreciate the convenience of seeing ads for things we're actually interested in buying, instead of irrelevant "clutter." A lot of us would like someone, or something, else keeping track of how effective our workouts are. read more »
What does the future hold for enterprise security? What will programs, roles, technologies and policies look like in five years or so? read more »more in depth ..
Most Popular in Security
Supermicro IPMI flaw used to create huge botnet, says VeriSign
Hacked planes. Unstoppable, utterly malicious flash drives. Hotel automation gone crazy. These are the 10 most terrifying security stories out of the premier hacker and security conferences in Las Vegas.
Don't scoff; rewarding good deeds actually works.
Salesforce, PayPal, SharePoint, Facebook, Google Apps...
From mobile phones and cars to IPv6, security researchers have turned their skills against a world of technology
Develop a security baseline and measure systems against the baseline
The terminology minimises the struggle involved in ensuring end point securityread more »
Rampant Government Surveillance and Increased Regulation Around The Globeread more »more blogs ..
Also in slideshows :
Join ComputerworldUK's editor in chief, Mike Simons, and Dell executives in a series of video discussions on how to respond to cyber criminals
HP Data Protection Zone is your source for software downloads, video, whitepapers and news on how you can keep your business data safe. Read more...
View the latest capacity management resources including white papers, videos and news.