SecuritySecurity also in this channel
Google plans to remove support for the aging Secure Sockets Layer (SSL) version 3.0 protocol in Google Chrome 40, which is expected to ship in about two months. read more »
Facebook has made its site directly available on Tor to prevent access problems for people using the anonymity network and to provide an alternative method of accessing the social network securely. read more »
Google is applying a surveying technique from the 1960s to a project that aims to collect data about users' computers without potentially compromising their privacy. read more »
The critical Shellshock vulnerabilities found last month in the Bash Unix shell have motivated security researchers to search for similar flaws in old, but widely used, command-line utilities. read more »
Users of Drupal, one of the most popular content management systems, should consider their sites compromised if they didn't immediately apply a security patch released on Oct. 15. read more »more news ..
Join ComputerworldUK'S editor in chief, Mike Simons, and Dell executives in a series of video discussions on how to respond to cyber criminals.
The latest news, features and slideshows about Google's Nexus series, including the Nexus 4 smartphone and Nexus 10 tablet.
Explore how you can improve your servers, storage and networks by developing your infrastructure.
Check out our latest articles on Microsoft's next-generation operating system.
It sounds like the operating system that really needs some serious security patches is the human one. read more »
Data is compromised so frequently these days that it seems like nothing is safe anymore. So one would be forgiven for thinking that using apps that require the user to voluntarily submit payment card information in order to function -- think Venmo, Uber, etc. -- would be a risky play. read more »
It's no longer unusual to see major, massive hacks make news these days. They affect millions of individuals and cost millions of dollars to rectify. read more »
Put simply, cybercrime, especially financial malware, has the potential to be quite the lucrative affair. That's only because the bad guys have the tools to make their work quick and easy, though. read more »
Today, more and more businesses are foregoing the traditional design setup of cubicles and closed-off offices for an open floor plan. read more »more in depth ..
Most Popular in Security
Given the recent iOS update and iPhone announcement, a security group provides tips to fend off threats to your device.
Place security higher up the supply chain, as parts that come from different suppliers could reveal vulnerabilities, experts warn
Musicians dominate the 2014 list of celebs you might not want to search on for fear of malware
Flaws identified in wget and tnftp allow malicious servers to execute rogue commands on users' systems
Experts say training -- done well and frequently -- can make employees much more difficult to 'hack'
Key questions to askread more »
Are boards getting the advice they need?read more »more blogs ..
Also in slideshows :
Join ComputerworldUK's editor in chief, Mike Simons, and Dell executives in a series of video discussions on how to respond to cyber criminals
HP Data Protection Zone is your source for software downloads, video, whitepapers and news on how you can keep your business data safe. Read more...
View the latest capacity management resources including white papers, videos and news.