We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message

Anonymous

Anonymous News

Tor anonymity network to shrink as a result of Heartbleed flaw

The Tor Project banned 380 vulnerable entry and exit relays and is eyeing 1,000 more read more »

Telefónica starts exchange for targeted mobile ads

Axonix' ambition is to compete with Google, Facebook and Twitter in the mobile ad space read more »

TrueCrypt source code audit finds no critical flaws or intentional backdoors

Some vulnerabilities were identified but are likely accidental, security auditors from iSEC Partners said read more »

NHS 24s new IT system plagued by testing issues

Indefinite delay while the associated NHS 111 will still be rolled out this month read more »

NSA denies knowing about Heartbleed flaw for years

The agency disputes a report that it used Heartbleed to conduct surveillance read more »

Cybercriminals use sophisticated PowerShell-based malware

Two separate threats that use malicious Windows PowerShell scripts were identified in the past few weeks by malware researchers read more »

more news ..

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.


Windows 8

Windows 8

Check out our latest articles on Microsoft's next-generation operating system.


Securing the Enterprise

 Join ComputerworldUK's editor in chief, Mike Simons, and Dell executives in a series of video discussions on how to respond to cyver criminals.


HP acquisitions

HP acquisitions

Following HP's dispute with Autonomy, we look back at other HP acquisitions in this Computerworld UK slideshow.


Advertisement
Anonymous In Depth

The paranoid's survival guide, part 1: How to protect your personal data

Privacy is not dead yet... read more »

Westminster View: The government must address the problems with care.data, not just delay

Patient data needs to be genuinely anonymous and citizens should be able to opt out online read more »

Big data blues: The dangers of data mining

Big data might be big business, but overzealous data mining can seriously destroy your brand. read more »

A year at Yahoo and Mayer still sprinting to catch up

One analyst gives CEO an 'A' for effort but said her final grade is 'to be determined' read more »

UEFA hosting partnership aids journey to public cloud

Football governing body faces rise in hactivist attacks read more »

Seven essentials for defending against DDoS attacks

As hackers get stealthier and more vicious, security leaders across all industries need to be prepared read more »

more in depth ..
Anonymous Slideshows

The sorriest tech companies of 2012

No, really, they're sorry! Vendors apologise in 2012 for everything from Apple Maps to Cisco Connect Cloud to outage after outage and breach after breach read more »

10 Gmail tools to supercharge your inbox

From dynamic contact tracking to analytics in your inbox, these add-ons and services provide enhanced capabilities for both casual and power Gmail users read more »

25 free open source projects IT pros will love

SourceForge expert points out 25 lesser-known projects for IT folks read more »

Twenty great tech products on show at DEMO 2011

Build-your-own iPhone and Android apps, cloud services, photo tools and more read more »

more slideshows ..
White Papers

Avoiding the 7 Deadly Sins of IT Security

Prevention is more important than detection read more »

What Do You Mean My Cloud Data Isn’t Secure?

Understanding your level of data protection read more »

more white papers ..

ComputerworldUK Knowledge Vault

ComputerworldUK
Share
x
Open