We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message

Authentication

Authentication News

Satellite communication systems rife with security flaws, vulnerable to remote hacks

Researchers found critical vulnerabilities in satellite communications devices used in the defense, maritime, aerospace and other sectors read more »

Facebook users targeted by iBanking Android trojan app

A computer Trojan injects messages into Facebook to trick users into installing Android malware, researchers from ESET said read more »

Teen arrested in Heartbleed attack against Canadian tax site

The Canada Revenue Agency reported data on 900 taxpayers was stolen through the Web vulnerability read more »

Update: German researchers hack Galaxy S5 fingerprint login

The integration with Paypal makes the weakness of Samsung's implementation extra serious read more »

Lavaboom builds encrypted webmail service to resist snooping

The service has started accepting registrations for its upcoming beta testing period read more »

Jetpack for WordPress pushes patch for two year-old flaw

Jetpack updates should be available though the WordPress auto-update feature read more »

more news ..

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.


Windows 8

Windows 8

Check out our latest articles on Microsoft's next-generation operating system.


Securing the Enterprise

 Join ComputerworldUK's editor in chief, Mike Simons, and Dell executives in a series of video discussions on how to respond to cyver criminals.


HP acquisitions

HP acquisitions

Following HP's dispute with Autonomy, we look back at other HP acquisitions in this Computerworld UK slideshow.


Advertisement
Authentication In Depth

How to defend against the OpenSSL Heartbleed flaw

Basic steps for IT CIOs, CISOs and IT Directors to take now read more »

Security Manager's Journal: Thousands of dollars in phone calls? Management hates that

We got our money back... read more »

Security should no longer be 'cementing' the status quo

If your security programme is struggling, don't stick with it because it's the way things have always been done read more »

Enterprise Risk Management: Old concept, new ideas

The CSO role is not assessing risk but practicing threat management read more »

IT's new concern: The personal cloud

read more »

Sizing up open source: Not so simple

Open-source software throws a wrench into traditional software evaluation criteria. Here's what to look for and what you'll be expected to contribute. read more »

more in depth ..
Authentication Slideshows

Wearables at Mobile World Congress

The best of what we saw read more »

Top two-factor authentication tools

Quick steps to improved ID and security management read more »

RSA 2013: Six security startups

These companies are tackling today's biggest security issues, from cloud security to authentication to mobile device management - See more at: http://www.infoworld.com/slideshows#sthash.woGoAN8P.dpuf read more »

Mageia - A rising Linux star

If the world of Linux distributions has ever had a rising star, it's Mageia. Read on for a brief tour of Mageia's interface and features read more »

more slideshows ..
White Papers

Avoiding the 7 Deadly Sins of IT Security

Prevention is more important than detection read more »

What Do You Mean My Cloud Data Isn’t Secure?

Understanding your level of data protection read more »

more white papers ..

ComputerworldUK Knowledge Vault

ComputerworldUK
Share
x
Open