The company said it has made an encryption breakthrough that will put financial institutions at ease read more »
Where you are and what you're doing in your car could suddenly become very public. read more »
iOS 8 isn't as much of a paradigm shift for users as some earlier releases, but that doesn't mean IT departments can easily it write off. read more »
The default browser in older, widely used versions of Android contains a vulnerability that can be used to bypass the same-origin policy read more »
The errors, which can shut off traffic, are occurring more frequently with little explanation, said Renesys read more »
Attack believed to have originated in China read more »more news ..
Big questions ahead of tomorrow's launch read more »
APIs, supply chain, profit and survival read more »
Wearables are not just a consumer play read more »
Balancing the excitment of innovation with a security pro's natural caution read more »more blogs ..
Watch this on demand webinar which explores IT innovation, managed print services and business agility.
Check out our latest articles on Microsoft's next-generation operating system.
Join ComputerworldUK's editor in chief, Mike Simons, and Dell executives in a series of video discussions on how to respond to cyver criminals.
Following HP's dispute with Autonomy, we look back at other HP acquisitions in this Computerworld UK slideshow.
Authentication In Depth
Are some APIs too precious to give away? Swisscom strikes a balance with big data read more »
The risks are no greater than transactions involving payment cards read more »
Here are four tips for preventing social engineering and DDoS hacks from ruining your business. read more »
Learning from the SaaS pioneer read more »
Cripple the automated processes presented by malware platforms and the threats aren't quite so serious read more »
Market not worth spit much less the time and money unless someone transforms the category, argues analyst read more »more in depth ..
From analysing the way you walk to your heartbeat, these password killers could be here soon. read more »
Hacked planes. Unstoppable, utterly malicious flash drives. Hotel automation gone crazy. These are the 10 most terrifying security stories out of the premier hacker and security conferences in Las Vegas. read more »
Make sure no-one gets a good catch at an employee's expense - consumer security provider BullGuard has put together a few tips on Phishing prevention read more »
Android mobile devices, while not typically thought of as places where development work gets done, can offer surprisingly useful apps to help developers get the job done, anywhere. read more »more slideshows ..