We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message

Authentication

Authentication News

Internet of things devices contain high number of vulnerabilities, study finds

Security researchers from Hewlett-Packard found 250 security issues when analyzing 10 popular IoT devices read more »

AMD's new 64-bit ARM board points way to x86 coexistence

AMD's 64-bit server development board has the company's first ARM processors read more »

City of London Police to deploy warning banners on illegal websites

Working with Project Sunblock to identify copyright infringing websites read more »

Attackers install DDoS bots on Amazon cloud, exploiting Elasticsearch weakness

Attackers are targeting Amazon EC2 instances with Elasticsearch 1.1.x installed read more »

EU, Google, Microsoft, Yahoo meet on 'right to be forgotten' but questions remain

Additional questions should be answered by the end of July read more »

Arrests made after international cyber-ring targets StubHub

StubHub accounts were compromised and used to buy tickets for popular events, which were then resold read more »

more news ..

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.


Windows 8

Windows 8

Check out our latest articles on Microsoft's next-generation operating system.


Securing the Enterprise

 Join ComputerworldUK's editor in chief, Mike Simons, and Dell executives in a series of video discussions on how to respond to cyver criminals.


HP acquisitions

HP acquisitions

Following HP's dispute with Autonomy, we look back at other HP acquisitions in this Computerworld UK slideshow.


Advertisement
Authentication In Depth

Beware the next circle of hell: Unpatchable systems

Insecure by design and trusted by default, embedded systems present security concerns that could prove crippling read more »

How Windows Enterprise BranchCache increases network efficiency

Be productive while remaining secure read more »

OpenStack 101: The parts that make up the project

Understanding the building blocks read more »

Gartner tells IT executives how to enable enterprise collaboration

Why is it so hard? read more »

How to defend against the OpenSSL Heartbleed flaw

Basic steps for IT CIOs, CISOs and IT Directors to take now read more »

Windows 8 VPN features

Secure connections in Windows 8 read more »

more in depth ..
Authentication Slideshows

11 Android tools for web developers

Android mobile devices, while not typically thought of as places where development work gets done, can offer surprisingly useful apps to help developers get the job done, anywhere. read more »

Hero hacks: 14 Raspberry Pi projects primed for IT

VoIP PBXes, NTP servers, Web-controlled power strips - hack together one of these handy, cheap solutions for the server closet and beyond read more »

Eight ways the password is dying

From smartphones that know you’re near to tattoos and even pills, high-tech companies are busy replacing pesky strings of text with easier ways to authenticate. Check out the future here. read more »

Microsoft's SME offerings

Microsoft takes us around a Kelly Hoppen designed apartment to show us its collaborative business products read more »

more slideshows ..
White Papers

Avoiding the 7 Deadly Sins of IT Security

Prevention is more important than detection read more »

What Do You Mean My Cloud Data Isn’t Secure?

Understanding your level of data protection read more »

more white papers ..

ComputerworldUK Knowledge Vault

ComputerworldUK
Share
x
Open