SecuritySecurity also in this channel
Security researchers have recently found a vulnerability that could be used to hijack Android apps and devices, but an older issue that can have the same effect remains a significant threat nearly two years after its discovery, according to security firm Bromium. read more »
A new program that encrypts files to extort money from users highlights that attackers don't need advanced programming skills to create dangerous and effective ransomware threats, especially when strong encryption technology is freely available. read more »
Betting firm Paddy Power has revealed that it is contacting 649,055 customers who were affected by a cyber attack on its IT systems four years ago. read more »
The latest release of a Microsoft security tool that's designed to stop exploits lets administrators control when third-party plugins are launched, a long favored route for attackers. read more »
Malicious hackers are using remote access tools to break into retail point-of-sale systems and plant malware on them, the Department of Homeland Security warned. read more »more news ..
Join ComputerworldUK'S editor in chief, Mike Simons, and Dell executives in a series of video discussions on how to respond to cyber criminals.
The latest news, features and slideshows about Google's Nexus series, including the Nexus 4 smartphone and Nexus 10 tablet.
Explore how you can improve your servers, storage and networks by developing your infrastructure.
Check out our latest articles on Microsoft's next-generation operating system.
Recent revelations concerning the techniques used by the spy agency, GCHQ to ‘protect’ the UK highlight some of the shadier methods it deploys for online surveillance or to manipulate and distort online discussion. Many of the techniques deployed by GCHQ bear a disturbing resemblance to those used by cyber criminals for their own commercial gain and in corporate espionage. read more »
Most of us would love a break on our health insurance. We would generally appreciate the convenience of seeing ads for things we're actually interested in buying, instead of irrelevant "clutter." A lot of us would like someone, or something, else keeping track of how effective our workouts are. read more »
What does the future hold for enterprise security? What will programs, roles, technologies and policies look like in five years or so? read more »
Physical perimeter security can differ from facility to facility, with myriad factors playing into what exactly is implemented, including budget and the assets that are being protected. read more »
Insecure by design and trusted by default, embedded systems present security concerns that could prove crippling read more »more in depth ..
Most Popular in Security
Affected customers who held accounts with the betting firm in 2010
Fitness trackers and other wearables are all the rage, but privacy advocates warn that they come with the risk of a "privacy nightmare"
The group has ties to the Chinese hacker underground and uses custom tools to attack companies, researchers from Dell SecureWorks said
As global security fears mount...
Balancing the excitment of innovation with a security pro's natural cautionread more »
Tools and services are necessary but changing culture is essentialread more »more blogs ..
Also in slideshows :
Join ComputerworldUK's editor in chief, Mike Simons, and Dell executives in a series of video discussions on how to respond to cyber criminals
HP Data Protection Zone is your source for software downloads, video, whitepapers and news on how you can keep your business data safe. Read more...
View the latest capacity management resources including white papers, videos and news.