Security

RSS FeedSecurity also in this channel

Security Newsletter

Latest News

The 'grinch' isn't a Linux vulnerability, Red Hat says

The 'grinch' isn't a Linux vulnerability, Red Hat says

The "grinch" Linux vulnerability that Alert Logic raised alarms about Tuesday is not a vulnerability at all, according to Red Hat. read more »

Ofcom fended off 1,600 cyberattacks in two months, FoI request reveals

The UK Office of Communications (Ofcom) fended off over 1,600 cyberattacks in only two months, a Freedom of Information request by software security firm Veracode has revealed. read more »

This Linux grinch could put a hole in your security stocking

A grinch may be snatching away some year-end holiday time, forcing Linux system administrators to fill a gaping security hole in their systems. read more »

Google's work on full encryption chugs along, with Yahoo's help

Message encryption code has been migrated to Github to encourage involvement from wider tech community read more »

After the Snowden leaks, 700m act to avoid NSA spying

Over 39 percent of 23,376 internet users surveyed across the world have acted to protect their online privacy as a result of the NSA spying revelations, according to the Centre for International Governance Innovation. read more »

more news ..
Advertisement

Lexmark

Windows Server 2003 Migration: what you need to know

Support for Windows Server 2003 ends in July 2015, ComputerworldUK Editor Mike Simons discusses the migration options with Dell and Microsoft. Find out more


Google Nexus series

Google Nexus series

The latest news, features and slideshows about Google's Nexus series, including the Nexus 4 smartphone and Nexus 10 tablet.


Webcast

Part 2 of your journey to virtualisation

Explore how you can improve your servers, storage and networks by developing your infrastructure.


Windows 8

Windows 8

Check out our latest articles on Microsoft's next-generation operating system.


In Depth

3 low-tech threats that lead to high-profile breaches

In an age where data security defenses are getting more and more sophisticated, there will be increased pressure for malicious parties to glean information from within the organization's walls or public places. read more »

The 9 essential rules for securing an Android smartphone

Smartphone and tablet users are constantly implored to secure their devices with PINs and other security settings but most rarely venture beyond a simple screen lock. This isn’t enough for reasons that will become clear. If a thief gets hold of a lost or stolen device or tablet there are numerous ways of re-using the handset, accessing any data it contains and even hijacking the account to make expensive calls. read more »

Privacy is the new killer app

A funny thing is happening in the wake of the Edward Snowden NSA revelations, the infamous iCloud hack of celebrity nude photos, and the hit parade of customer data breaches at Target, Home Depot and the U.S. Postal Service. If it's not the government looking at your data, it's bored, lonely teenagers from the Internet or credit card fraudsters. read more »

New PCI council leader ready to take on the hackers

Stephen W. Orfei is the incoming general manager of the PCI Security Standards Council. He succeeds the council's first general manager, Bob Russo, who will retire at the end of 2014. Here he speaks to ComputerworldUK'ssister title CSO about hackers, security challenges and efforts to overcome the backwardness of US payment card technologies. read more »

The human OS: Overdue for a social engineering patch

It sounds like the operating system that really needs some serious security patches is the human one. read more »

more in depth ..
Most Popular in Security

Ofcom fended off 1,600 cyberattacks in two months, FoI request reveals

SQL injection attacks a running sore

The 9 essential rules for securing an Android smartphone

Everyone adds a screen lock. But what's next?

IT and end users are far apart on critical data access

Too much security complacency in the IT department

White Papers

Avoiding the 7 Deadly Sins of IT Security

Prevention is more important than detection read more »

What Do You Mean My Cloud Data Isn’t Secure?

Understanding your level of data protection read more »

more white papers ..
Blogs

When it comes to security, don’t shoot the developer

Don't alienate development teams - communicate with themread more »

More Money, More Problems For Security Organisations In 2015

Beware executives bearing gifts...read more »

more blogs ..
Advertisement
ComputerworldUK Poll

Microsoft CEO Satya Nadella says the company's "devices and services" strategy is dead. So, what should Microsoft focus on instead?







Solution Centres

Securing the Enterprise

Join ComputerworldUK's editor in chief, Mike Simons, and Dell executives in a series of video discussions on how to respond to cyber criminals


HP Data Protection Zone

HP Data Protection Zone

HP Data Protection Zone is your source for software downloads, video, whitepapers and news on how you can keep your business data safe. Read more...


Agile Data Center

Transition to the Agile Data Center

Explore the importance of the agile data center to the business, and ideas on how IT can make this transition


Advertisement

We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message

ComputerworldUK Knowledge Vault

ComputerworldUK
Share
x
Open