These tips and tools can help you keep your smartphone close, and protect your data if it strays read more »
Some iOS users found a malicious library of unknown origin on their jailbroken devices read more »
The telco's annual data breach report incorporates data from more sources than ever before read more »
When Internet and phone service goes down, the problem is traced to VM images installed in a classroom. read more »
A computer Trojan injects messages into Facebook to trick users into installing Android malware, researchers from ESET said read more »
Patching the vulnerable OpenSSL software is just the first step, security experts say read more »more news ..
Anti-virus Blogsmore blogs ..
Watch this on demand webinar which explores IT innovation, managed print services and business agility.
Check out our latest articles on Microsoft's next-generation operating system.
Join ComputerworldUK's editor in chief, Mike Simons, and Dell executives in a series of video discussions on how to respond to cyver criminals.
Following HP's dispute with Autonomy, we look back at other HP acquisitions in this Computerworld UK slideshow.
Anti-virus In Depth
Ransomware with unbreakable encryption will attract cyber bandits like flies to offal read more »
Is Microsoft's latest operating system a better investment than XP? read more »
Hackers, from the opportunistic to bitcoin-stealing specialists, try to get in on the action, say researchers who tallied malware targeting the virtual currencies read more »
The high number of attendees and exhibitors at security event are indication of troubled times read more »
Security pros and government officials warn of a possible cyber 9/11 involving banks, utilities, other companies, or the Internet read more »
As more consumers and businesses go mobile, 2013 will be Microsoft's most challenging year yet read more »more in depth ..
Here are some of the best-known free security tools you can try inside your own network read more »
No, really, they're sorry! Vendors apologise in 2012 for everything from Apple Maps to Cisco Connect Cloud to outage after outage and breach after breach read more »
Tools that secure, automate, pinch pennies - including some for Windows 8 read more »
Google and Amazon spend millions to bet on names like BUY, GAME and SHOP read more »more slideshows ..