We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message

Security

RSS FeedSecurity also in this channel

Security Newsletter

Latest News

Workers at U.S. nuclear regulator fooled by phishers

Workers at U.S. nuclear regulator fooled by phishers

Nuclear Regulatory Commission employees were tricked into disclosing passwords and downloading malware in three phishing attacks that occurred over a three-year period. read more »

'Reveton' ransomware upgraded with powerful password stealer

A type of malware called Reveton, which falsely warns users they've broken the law and demands payment of a fine, has been upgraded with powerful password stealing functions, according to Avast. read more »

Healthcare organizations still too lax on security

The data breach at Community Health Systems that exposed the personal information on more than 4.5 million people is a symptom of the chronic lack of attention to patient data security and privacy within the healthcare industry. read more »

Facebook says most outbound email is encrypted now

Nearly all of Facebook's outbound notification emails are now encrypted while traveling the Internet, a collaborative feat that comes from the technology industry's push to thwart the NSA's spying programs. read more »

Tech pros in healthcare, retail and finance admit they are failing on data compliance

Most technology pros charged with maintaining compliance at tightly regulated healthcare, retail and financial organisations admit they are failing. read more »

more news ..
Advertisement

Securing the Enterpise

Join ComputerworldUK'S editor in chief, Mike Simons, and Dell executives in a series of video discussions on how to respond to cyber criminals.


Google Nexus series

Google Nexus series

The latest news, features and slideshows about Google's Nexus series, including the Nexus 4 smartphone and Nexus 10 tablet.


Webcast

Part 2 of your journey to virtualisation

Explore how you can improve your servers, storage and networks by developing your infrastructure.


Windows 8

Windows 8

Check out our latest articles on Microsoft's next-generation operating system.


In Depth

Boost your security training with gamification

Getting employees to take security seriously can be a game that everyone wins. read more »

ERP security: Protecting the pipeline by focusing on business-critical platforms

In early July, news circulated that a Chinese manufacturer stood accused of tampering with the firmware of hand-held scanners. read more »

For Your Eyes Only: Corporate espionage using social channels – is your company at risk?

Recent revelations concerning the techniques used by the spy agency, GCHQ to ‘protect’ the UK highlight some of the shadier methods it deploys for online surveillance or to manipulate and distort online discussion. Many of the techniques deployed by GCHQ bear a disturbing resemblance to those used by cyber criminals for their own commercial gain and in corporate espionage. read more »

Wearables: Are we handing more tools to Big Brother?

Most of us would love a break on our health insurance. We would generally appreciate the convenience of seeing ads for things we're actually interested in buying, instead of irrelevant "clutter." A lot of us would like someone, or something, else keeping track of how effective our workouts are. read more »

The CSO of the future

What does the future hold for enterprise security? What will programs, roles, technologies and policies look like in five years or so? read more »

more in depth ..
Most Popular in Security

Massive 300Gbps DDoS attack on media firm fuelled by unpatched server flaw

Supermicro IPMI flaw used to create huge botnet, says VeriSign

The 10 most terrifying security nightmares revealed at the Black Hat and Def Con hacker conferences

Hacked planes. Unstoppable, utterly malicious flash drives. Hotel automation gone crazy. These are the 10 most terrifying security stories out of the premier hacker and security conferences in Las Vegas.

Boost your security training with gamification

Don't scoff; rewarding good deeds actually works.

Former employees have become 'application menace' new study claims

Salesforce, PayPal, SharePoint, Facebook, Google Apps...

Black Hat 2014: How to crack just about everything

From mobile phones and cars to IPv6, security researchers have turned their skills against a world of technology

ERP security: Protecting the pipeline by focusing on business-critical platforms

Develop a security baseline and measure systems against the baseline

White Papers

Avoiding the 7 Deadly Sins of IT Security

Prevention is more important than detection read more »

What Do You Mean My Cloud Data Isn’t Secure?

Understanding your level of data protection read more »

more white papers ..
Blogs

Say 'small footprint' again. I dare you

The terminology minimises the struggle involved in ensuring end point securityread more »

Forrester's 2014 Data Privacy Heat Map

Rampant Government Surveillance and Increased Regulation Around The Globeread more »

more blogs ..
Advertisement
ComputerworldUK Poll

Microsoft CEO Satya Nadella says the company's "devices and services" strategy is dead. So, what should Microsoft focus on instead?







Solution Centres

Securing the Enterprise

Join ComputerworldUK's editor in chief, Mike Simons, and Dell executives in a series of video discussions on how to respond to cyber criminals


HP Data Protection Zone

HP Data Protection Zone

HP Data Protection Zone is your source for software downloads, video, whitepapers and news on how you can keep your business data safe. Read more...


Desktop Virtualization Solutions

Accelerate Your IT Efficiency

View the latest capacity management resources including white papers, videos and news.


Advertisement

ComputerworldUK Knowledge Vault

ComputerworldUK
Share
x
Open