Security

RSS FeedSecurity also in this channel

Security Newsletter

Latest News

iCloud flaw may have allowed nude celebrity photos to leak

iCloud flaw may have allowed nude celebrity photos to leak

A funny thing happened on the Internet Sunday as a cache of nude photos of Kate Upton, Jennifer Lawrence, and other big-name stars made their way onto 4chan, as BuzzFeed notes. Reports indicate that this leak may have been the result of a hacker (or hackers) taking advantage of a flaw in Apple's iCloud service. read more »

Namecheap says accounts compromised in hacking incident

Hosting provider Namecheap said Monday hackers compromised some of its users' accounts, likely using a recently disclosed list of 1.2 billion usernames and passwords compiled by Russian hackers. read more »

Why hackers may be stealing your credit card numbers for years

While conducting a penetration test of a major Canadian retailer, Rob VandenBrink bought something from the store. He later found his own credit card number buried in its systems, a major worry. read more »

Reconnaissance code on industrial software site points to watering hole attack

Attackers deploy Web-based reconnaissance tool to gather information about potential targets in different industries read more »

Europol launches international cybercrime task force

Europol launched a cybercrime task force Monday to fight online crime in the EU and other countries. read more »

more news ..
Advertisement

Securing the Enterpise

Join ComputerworldUK'S editor in chief, Mike Simons, and Dell executives in a series of video discussions on how to respond to cyber criminals.


Google Nexus series

Google Nexus series

The latest news, features and slideshows about Google's Nexus series, including the Nexus 4 smartphone and Nexus 10 tablet.


Webcast

Part 2 of your journey to virtualisation

Explore how you can improve your servers, storage and networks by developing your infrastructure.


Windows 8

Windows 8

Check out our latest articles on Microsoft's next-generation operating system.


In Depth

Four small business security lessons from real-life hacks

It's no longer unusual to see major, massive hacks make news these days. They affect millions of individuals and cost millions of dollars to rectify. read more »

Kicking the stool out from under the cybercrime economy

Put simply, cybercrime, especially financial malware, has the potential to be quite the lucrative affair. That's only because the bad guys have the tools to make their work quick and easy, though. read more »

Is the open plan office a data security headache?

Today, more and more businesses are foregoing the traditional design setup of cubicles and closed-off offices for an open floor plan. read more »

Boost your security training with gamification

Getting employees to take security seriously can be a game that everyone wins. read more »

ERP security: Protecting the pipeline by focusing on business-critical platforms

In early July, news circulated that a Chinese manufacturer stood accused of tampering with the firmware of hand-held scanners. read more »

more in depth ..
Most Popular in Security

Boost your security training with gamification

Don't scoff; rewarding good deeds actually works.

CryptoWall ransom Trojan has infected 625,000 systems, says Dell SecureWorks

Holds hostage a staggering 5.25 billion files

Payment cards with chips aren't perfect, so encrypt everything, experts say

The EMV or 'chip-and-PIN' system is not without security flaws, researchers warned

The 10 most terrifying security nightmares revealed at the Black Hat and Def Con hacker conferences

Hacked planes. Unstoppable, utterly malicious flash drives. Hotel automation gone crazy. These are the 10 most terrifying security stories out of the premier hacker and security conferences in Las Vegas.

Kicking the stool out from under the cybercrime economy

Cripple the automated processes presented by malware platforms and the threats aren't quite so serious

Black Hat 2014: How to crack just about everything

From mobile phones and cars to IPv6, security researchers have turned their skills against a world of technology

White Papers

Avoiding the 7 Deadly Sins of IT Security

Prevention is more important than detection read more »

What Do You Mean My Cloud Data Isn’t Secure?

Understanding your level of data protection read more »

more white papers ..
Blogs

Say 'small footprint' again. I dare you

The terminology minimises the struggle involved in ensuring end point securityread more »

Forrester's 2014 Data Privacy Heat Map

Rampant Government Surveillance and Increased Regulation Around The Globeread more »

more blogs ..
Advertisement
ComputerworldUK Poll

Microsoft CEO Satya Nadella says the company's "devices and services" strategy is dead. So, what should Microsoft focus on instead?







Solution Centres

Securing the Enterprise

Join ComputerworldUK's editor in chief, Mike Simons, and Dell executives in a series of video discussions on how to respond to cyber criminals


HP Data Protection Zone

HP Data Protection Zone

HP Data Protection Zone is your source for software downloads, video, whitepapers and news on how you can keep your business data safe. Read more...


Desktop Virtualization Solutions

Accelerate Your IT Efficiency

View the latest capacity management resources including white papers, videos and news.


Advertisement

We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message

ComputerworldUK Knowledge Vault

ComputerworldUK
Share
x
Open