Security

RSS FeedSecurity also in this channel

Security Newsletter

Latest News

We just might put a dent in data breaches

Is the dawn of the age of ubiquitous e-payments finally here? Can we throw away our credit cards yet? read more »

GCHQ harnessing analytical skills of 120 dyslexic and dyspraxic spies

GCHQ (the Government Communications Headquarters) has revealed that it employs over 100 dyslexic and dyspraxic 'neuro-diverse' spies as they possess many of the analytical skills needed to help fight terrorism. read more »

David Cameron appoints special envoy for intelligence and law enforcement data sharing

Prime minister David Cameron has appointed Sir Nigel Sheinwald as a special envoy on "intelligence and law enforcement data sharing". read more »

New organization sets out to make secure communication tools more user-friendly

Google, Dropbox and the Open Technology Fund are supporting a new organization focused on making open-source security and privacy tools more user-friendly. read more »

Apple's iOS 8 fixes enterprise Wi-Fi authentication hijacking issue

Apple's iOS 8 addresses a serious weakness that could allow attackers to hijack the wireless network authentication of Apple devices and gain access to enterprise networks. read more »

more news ..
Advertisement

Securing the Enterpise

Join ComputerworldUK'S editor in chief, Mike Simons, and Dell executives in a series of video discussions on how to respond to cyber criminals.


Google Nexus series

Google Nexus series

The latest news, features and slideshows about Google's Nexus series, including the Nexus 4 smartphone and Nexus 10 tablet.


Webcast

Part 2 of your journey to virtualisation

Explore how you can improve your servers, storage and networks by developing your infrastructure.


Windows 8

Windows 8

Check out our latest articles on Microsoft's next-generation operating system.


In Depth

Why giving mobile apps banking info isn't as risky as it seems

Data is compromised so frequently these days that it seems like nothing is safe anymore. So one would be forgiven for thinking that using apps that require the user to voluntarily submit payment card information in order to function -- think Venmo, Uber, etc. -- would be a risky play. read more »

Four small business security lessons from real-life hacks

It's no longer unusual to see major, massive hacks make news these days. They affect millions of individuals and cost millions of dollars to rectify. read more »

Kicking the stool out from under the cybercrime economy

Put simply, cybercrime, especially financial malware, has the potential to be quite the lucrative affair. That's only because the bad guys have the tools to make their work quick and easy, though. read more »

Is the open plan office a data security headache?

Today, more and more businesses are foregoing the traditional design setup of cubicles and closed-off offices for an open floor plan. read more »

Boost your security training with gamification

Getting employees to take security seriously can be a game that everyone wins. read more »

more in depth ..
Most Popular in Security

Mastercard trials voice and face recognition mobile payment technology

Biometrics entering the mainstream

Aspiring cyber defenders battle it out in GCHQ competition

50 people investigated a cyber attack simulated by the intelligence agency

David Cameron appoints special envoy for intelligence and law enforcement data sharing

Former ambassador to US to broker data snooping procedure between government and business

Why giving mobile apps banking info isn't as risky as it seems

The risks are no greater than transactions involving payment cards

Kicking the stool out from under the cybercrime economy

Cripple the automated processes presented by malware platforms and the threats aren't quite so serious

White Papers

Avoiding the 7 Deadly Sins of IT Security

Prevention is more important than detection read more »

What Do You Mean My Cloud Data Isn’t Secure?

Understanding your level of data protection read more »

more white papers ..
Advertisement
ComputerworldUK Poll

Microsoft CEO Satya Nadella says the company's "devices and services" strategy is dead. So, what should Microsoft focus on instead?







Solution Centres

Securing the Enterprise

Join ComputerworldUK's editor in chief, Mike Simons, and Dell executives in a series of video discussions on how to respond to cyber criminals


HP Data Protection Zone

HP Data Protection Zone

HP Data Protection Zone is your source for software downloads, video, whitepapers and news on how you can keep your business data safe. Read more...


Desktop Virtualization Solutions

Accelerate Your IT Efficiency

View the latest capacity management resources including white papers, videos and news.


Advertisement

We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message

ComputerworldUK Knowledge Vault

ComputerworldUK
Share
x
Open