We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message

Security

RSS FeedSecurity also in this channel

Security Newsletter

Latest News

Satellite communication systems rife with security flaws, vulnerable to remote hacks

Security researchers have found that many satellite communication systems have vulnerabilities and design flaws that can let remote attackers intercept, manipulate, block and in some cases take full control of critical communications. read more »

Michaels says breach at its stores affected nearly 3M payment cards

About 2.6 million payment cards at Michaels Stores and another 400,000 at subsidiary Aaron Brothers may have been affected in a card skimming attack that compromised its point-of-sale systems, the retailer said Thursday. read more »

IT security is national security -- but you're not alone

National security may be at stake as private businesses try to manage a growing number of cyberthreats, but IT professionals shouldn't have to bear that burden alone. read more »

Netcraft tool flags websites affected by Heartbleed

Worried about how the Heartbleed vulnerability may affect your personal accounts? A new tool may be of help. read more »

Tor anonymity network to shrink as a result of Heartbleed flaw

The Tor Project has flagged 380 Tor relays vulnerable to the critical Heartbleed flaw to be rejected from the Tor anonymity network, reducing the network's entry and exit capacity. read more »

more news ..
Advertisement
Advertisement

Securing the Enterpise

Join ComputerworldUK'S editor in chief, Mike Simons, and Dell executives in a series of video discussions on how to respond to cyber criminals.


Google Nexus series

Google Nexus series

The latest news, features and slideshows about Google's Nexus series, including the Nexus 4 smartphone and Nexus 10 tablet.


Webcast

Part 2 of your journey to virtualisation

Explore how you can improve your servers, storage and networks by developing your infrastructure.


Windows 8

Windows 8

Check out our latest articles on Microsoft's next-generation operating system.


In Depth

How to defend against the OpenSSL Heartbleed flaw

CSOs need to take a number of steps as soon as possible to protect their organizations against the OpenSSL vulnerability that has shaken the tech industry, experts say. read more »

Windows XP support ended 8th April

Microsoft's operating system becomes open to attack read more »

Security Manager's Journal: Thousands of dollars in phone calls? Management hates that

As a security manager, I expect my company to be hit by malware infestations, data theft, denial-of-service attacks and attempts at unauthorised access. I deal with them all as they arise, and they do keep things interesting. read more »

Security should no longer be 'cementing' the status quo

When considering the alarming number of mega-data breaches and other such security incidents as they occur almost daily, and then compare the announced "root causes" and "used attack paths" of the incidents with the current state-of-the-art strategies to defend against attacks, I have come to conclusion that, unfortunately, security (risk, audit, and compliance, and any other assurance functions) is more often than not only "cementing" the status quo, that is the currently used processes or ways of doing business in a somewhat "secure" fashion. read more »

CyberLocker's success will fuel future copycats

Nothing spurs malware development like success and that's likely to be the case in the coming months with ransomware. read more »

more in depth ..
Most Popular in Security

How to defend against the OpenSSL Heartbleed flaw

Basic steps for IT CIOs, CISOs and IT Directors to take now

Hackers try to blackmail plastic surgeon after stealing 500,000 patient records

Data stolen from web enquiry forms

How to hack an iPad

Prevent access with a four-digit PIN code or beware - your device can be hacked!

Financial services firms to increase cyber security budgets this year, PwC claims

Two-fifths plan to up spending to meet growing threat

The top five stupid hacker tricks

Hackers make mistakes just as often as anyone else

City of London police commissioner hits back at cyber-crime critics

Adrian Leppard explains how the forces are tackling the growing threat posed by cyber criminals

12 useful websites for IT security

From Microsoft and Cisco to the National Institute of Standards and Technology, we look at some of the most useful IT security websites

15 free security tools you should try

Here are some of the best-known free security tools you can try inside your own network

White Papers

Avoiding the 7 Deadly Sins of IT Security

Prevention is more important than detection read more »

What Do You Mean My Cloud Data Isn’t Secure?

Understanding your level of data protection read more »

more white papers ..
Advertisement
ComputerworldUK Poll

Office on the iPad




Solution Centres

Securing the Enterprise

Join ComputerworldUK's editor in chief, Mike Simons, and Dell executives in a series of video discussions on how to respond to cyber criminals


HP Data Protection Zone

HP Data Protection Zone

HP Data Protection Zone is your source for software downloads, video, whitepapers and news on how you can keep your business data safe. Read more...


Desktop Virtualization Solutions

Accelerate Your IT Efficiency

View the latest capacity management resources including white papers, videos and news.


Advertisement

ComputerworldUK Knowledge Vault

ComputerworldUK
Share
x
Open