Security

RSS FeedSecurity also in this channel

Security Newsletter

Latest News

Uber links to sensitive ride data now expire after 48 hours

Uber has tweaked one of the features in its app after it was shown to let sensitive trip data become publicly accessible through Google. read more »

NIST sets the stage for contactless fingerprint readers

While many are hoping that biometric technologies such as fingerprint readers will one day replace cumbersome passwords, the U.S. National Institute of Technology is looking even further out. read more »

Blackberry buys Good Technology as it further expands into mobile device security

Blackberry placed rivalries aside and purchased Good Technology as the phone maker moves further into the mobile security market. read more »

LinkedIn-based intelligence gathering campaign targets the security industry

A LinkedIn-based intelligence gathering campaign has been using fake LinkedIn profiles to map out the professional networks of IT security experts. read more »

Even encrypted medical record databases leak information

A new study from Microsoft researchers warns that many types of databases used for electronic medical records are vulnerable to leaking information despite the use of encryption. read more »

more news ..
Advertisement

Lexmark

Navigating storage in a brave new world

Companies must provide a fast and reliable service if they are to remain competitive in a tough business landscape. Find out more


Google Nexus series

Google Nexus series

The latest news, features and slideshows about Google's Nexus series, including the Nexus 4 smartphone and Nexus 10 tablet.


Webcast

Part 2 of your journey to virtualisation

Explore how you can improve your servers, storage and networks by developing your infrastructure.


Windows 8

Windows 8

Check out our latest articles on Microsoft's next-generation operating system.


Features

The 10 riskiest Internet domains firewall admins should block

Set your filters – some of the new Internet domains are not ones users should visit, even accidentally read more »

Spotting fake invoice scams – what UK SMEs need to know

How do you know an invoice is genuine? With great difficulty, it turns out read more »

Are public Wi-Fi hotspots a security risk? Security risks of using public Wi-Fi explained

Public Wi-Fi is used by many to avoid big roaming bills. Can its risks be mitigated? Are public Wi-Fi hotspots a security risk? We examine the security risks of using public Wi-Fi. read more »

Cyber security top CIO concern as Coats re-lists on London Stock Exchange

Chief Information Officer at global manufacturing firm Coats, Richard Cammish, says cyber security was a key concern as the company re-listed on the London Stock Exchange. read more »

Android security in the enterprise - can the worst flaws be fixed?

How do Android's growing list of vulnerabilities affect enterprises and is there much they can do about them? read more »

more features ..
Most Popular in Security

The 10 riskiest Internet domains firewall admins should block

Set your filters – some of the new Internet domains are not ones users should visit, even accidentally

Spotting fake invoice scams – what UK SMEs need to know

How do you know an invoice is genuine? With great difficulty, it turns out

Securing the enterprise digital footprint

White Papers

Avoiding the 7 Deadly Sins of IT Security

Prevention is more important than detection read more »

What Do You Mean My Cloud Data Isn’t Secure?

Understanding your level of data protection read more »

more white papers ..
Advertisement
Blogs

The Danger Within: When is your company most vulnerable to internal threats?

Too much emphasis is placed on external threats and not enough attention is paid to internal ones.read more »

Security is still paying a high price for sprawl

Mergers and acquisition and corporate 'shiny toy' syndrome created software complexityread more »

more blogs ..
Solution Centres

Securing the Enterprise

Join ComputerworldUK's editor in chief, Mike Simons, and Dell executives in a series of video discussions on how to respond to cyber criminals


HP Data Protection Zone

HP Data Protection Zone

HP Data Protection Zone is your source for software downloads, video, whitepapers and news on how you can keep your business data safe. Read more...


Advertisement

We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message