Authentication

Authentication News

Flaw in popular Web analytics plug-in exposes WordPress sites to hacking

Attackers can easily crack cryptographic keys used by the WP-Slimstat plug-in and use them to read information from a site's database read more »

Liverpool University cures Dropbox security worries with Varonis file sharing

User base expands beyond 4,000 read more »

UK chip maker ARM plans to embed IoT security with acquisition

‘Silicon Fen’ company hopes to add more security features after buying Dutch company Offspark read more »

DDoS malware for Linux systems comes with sophisticated custom-built rootkit

XOR.DDoS is distributed through SSH brute-force password guessing attacks read more »

Cisco offers ACI alternative for Nexus 9000 switches

More flexibility for customers not yet opting for a full-blown app policy infrastructure. read more »

Siemens patches critical flaws in industrial wireless gear

The vulnerabilities allow attackers to take control of affected Ruggedcom WIN systems read more »

more news ..
Authentication Blogs

Five shades of grey

How software buyers and license managers should be compliant without being submissive read more »

Yup, Facebook At Work Is Real

Facebook can build it, but why go into competition with IBM, Microsoft, Salesforce, SAP and Google? read more »

European Commission Finally Engaging with Open Source?

Slowly getting there read more »

Let's Encrypt - and Fix HTTPS While We're At It

Web encryption is a good idea, but it's currently broken read more »

more blogs ..

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.


Windows 8

Windows 8

Check out our latest articles on Microsoft's next-generation operating system.


Securing the Enterprise

 Join ComputerworldUK's editor in chief, Mike Simons, and Dell executives in a series of video discussions on how to respond to cyver criminals.


HP acquisitions

HP acquisitions

Following HP's dispute with Autonomy, we look back at other HP acquisitions in this Computerworld UK slideshow.


Advertisement
Authentication In Depth

The NSA is inside hard drive firmware - now what?

Experts agree firmware attacks are possible. But until the Equation group report nobody was worried read more »

Most serious data breaches could be avoided, new analysis claims

OTA non-profit publishes industry best practices read more »

ComputerworldUK 2014 round-up: How banks got to grips with the digital agenda

Outages, fines, innovation and challenge from new players - banks were kept busy in 2014 read more »

Mobile devices – the weakest link of enterprise security?

Devices are lost at an alarming rate - and this is an area of vulnerability for businesses read more »

Westminster View: What sex work and e-reading teach us about federated architecture

How a start-up illustrated the benefits of having a thoughtful approach to architecture read more »

The best new features in Windows Server 10 (so far)

The early look at Windows Server 10 reveals many expected enhancements and nice surprises read more »

more in depth ..
Authentication Slideshows

First camera used in space goes up for auction

Hasselblad camera first taken into orbit by Wally Schirra in 1962 to be auctioned on 13 November read more »

7 futuristic authentication systems DARPA is funding

From analysing the way you walk to your heartbeat, these password killers could be here soon. read more »

The 10 most terrifying security nightmares revealed at the Black Hat and Def Con hacker conferences

Hacked planes. Unstoppable, utterly malicious flash drives. Hotel automation gone crazy. These are the 10 most terrifying security stories out of the premier hacker and security conferences in Las Vegas. read more »

Six tips to protect employees from phishing attacks

Make sure no-one gets a good catch at an employee's expense - consumer security provider BullGuard has put together a few tips on Phishing prevention read more »

more slideshows ..
White Papers

Avoiding the 7 Deadly Sins of IT Security

Prevention is more important than detection read more »

What Do You Mean My Cloud Data Isn’t Secure?

Understanding your level of data protection read more »

more white papers ..

We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message