The operation seized command-and-control servers and Internet domains used by the Ramnit gang read more »
The company confirmed that a software program preloaded on some of its laptops exposes users to potential attacks read more »
Security researchers found a strong connection between Regin and a keylogger used by the Five Eyes intelligence alliance read more »
The site hosts malware that masquerades as a Flash Player installer, security researchers found read more »
Users should install firmware updates as soon as they become available and should block untrusted devices on their networks read more »
Microsoft didn't fix the bug within a 90-day deadline Google imposed read more »more news ..
The terminology minimises the struggle involved in ensuring end point security read more »
Targeted cyberattacks are not random so risk assessment is complex read more »
A rapid evolution from the company's anti-virus origins read more »
When home security requires levels of expertise found in an SME, BYOD poses problems read more »more blogs ..
Watch this on demand webinar which explores IT innovation, managed print services and business agility.
Check out our latest articles on Microsoft's next-generation operating system.
Join ComputerworldUK's editor in chief, Mike Simons, and Dell executives in a series of video discussions on how to respond to cyver criminals.
Following HP's dispute with Autonomy, we look back at other HP acquisitions in this Computerworld UK slideshow.
Antivirus In Depth
Didn't hackers get the memo? They were supposed to be exploiting the unpatched Windows XP read more »
Ransomware with unbreakable encryption will attract cyber bandits like flies to offal read more »
Is Microsoft's latest operating system a better investment than XP? read more »
Hackers, from the opportunistic to bitcoin-stealing specialists, try to get in on the action, say researchers who tallied malware targeting the virtual currencies read more »
The high number of attendees and exhibitors at security event are indication of troubled times read more »
Security pros and government officials warn of a possible cyber 9/11 involving banks, utilities, other companies, or the Internet read more »more in depth ..
It's not just your boss or the government that's spying on you, it's also the devices and technologies you embrace. read more »
Whatever your poison -- Windows 7 or 8, updated or not -- there's a desktop tool just begging to become part of your repertoire read more »
Here are some of the best-known free security tools you can try inside your own network read more »
No, really, they're sorry! Vendors apologise in 2012 for everything from Apple Maps to Cisco Connect Cloud to outage after outage and breach after breach read more »more slideshows ..
IBM WebSphere Application Server v7 vs. JBoss EAP v5 TCO Analysis read more »
Virtual teams can better collaborate read more »more white papers ..