Infecting NAS devices with malware can be very valuable for attackers, a researcher said read more »
The attack could be used to distribute malware through applications that appear harmless, researchers said read more »
There is no evidence that personal information or debit-card PIN numbers were stolen, the company says read more »
Researchers found leaked documentation for application programming interfaces to interact with ATM devices read more »
Brigend office becomes part of global SOC system read more »
Public Malware Investigator portal nears launch read more »more news ..
The terminology minimises the struggle involved in ensuring end point security read more »
Targeted cyberattacks are not random so risk assessment is complex read more »
A rapid evolution from the company's anti-virus origins read more »
When home security requires levels of expertise found in an SME, BYOD poses problems read more »more blogs ..
Watch this on demand webinar which explores IT innovation, managed print services and business agility.
Check out our latest articles on Microsoft's next-generation operating system.
Join ComputerworldUK's editor in chief, Mike Simons, and Dell executives in a series of video discussions on how to respond to cyver criminals.
Following HP's dispute with Autonomy, we look back at other HP acquisitions in this Computerworld UK slideshow.
Antivirus In Depth
Didn't hackers get the memo? They were supposed to be exploiting the unpatched Windows XP read more »
Ransomware with unbreakable encryption will attract cyber bandits like flies to offal read more »
Is Microsoft's latest operating system a better investment than XP? read more »
Hackers, from the opportunistic to bitcoin-stealing specialists, try to get in on the action, say researchers who tallied malware targeting the virtual currencies read more »
The high number of attendees and exhibitors at security event are indication of troubled times read more »
Security pros and government officials warn of a possible cyber 9/11 involving banks, utilities, other companies, or the Internet read more »more in depth ..
It's not just your boss or the government that's spying on you, it's also the devices and technologies you embrace. read more »
Whatever your poison -- Windows 7 or 8, updated or not -- there's a desktop tool just begging to become part of your repertoire read more »
Here are some of the best-known free security tools you can try inside your own network read more »
No, really, they're sorry! Vendors apologise in 2012 for everything from Apple Maps to Cisco Connect Cloud to outage after outage and breach after breach read more »more slideshows ..
IBM WebSphere Application Server v7 vs. JBoss EAP v5 TCO Analysis read more »
Virtual teams can better collaborate read more »more white papers ..