We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message

Black Hat

The latest news and comment from the Black Hat hacker conference.

Black Hat News

Tor Project working to fix weakness that can unmask users

The anonymity software's developers believe they've identified the problem read more »

Black Hat presentation on TOR suddenly cancelled

The presentation revolved around de-anonymizing users of the privacy tool read more »

The 'Rickmote' shows no mercy when it finds someone using Chromecast

A Raspberry-Pi powered tool tricks Google Chromecast into playing Rick Astley read more »

New security problems keep eBay on edge

Independent security pros are finding all kinds of flaws in eBay's networks read more »

Heartbleed-like bug in OpenSSH dismissed as a hoax

Scammers claim they found a bug in the remote access tool two years ago read more »

NSA isn't evil, says noted civil libertarian

Geoffrey Stone says the beleaguered agency has successfully thwarted multiple terrorist plots since 9/11 read more »

more news ..

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.


Windows 8

Windows 8

Check out our latest articles on Microsoft's next-generation operating system.


Securing the Enterprise

 Join ComputerworldUK's editor in chief, Mike Simons, and Dell executives in a series of video discussions on how to respond to cyver criminals.


HP acquisitions

HP acquisitions

Following HP's dispute with Autonomy, we look back at other HP acquisitions in this Computerworld UK slideshow.


Advertisement
Black Hat In Depth

CISOs taking a leap of faith

Changing career focus can surprise you read more »

The ABC of the Internet of Things

There are no vendors large enough to control the IoT but vendors can make a mess of it. read more »

Hiring managers advise job seekers to contribute to open-source projects

Joining an open-source community isn't required to land a development job, but it could help read more »

Google Bouncer beaten at Black Hat 2012

Trustwave to show how it outwitted Google Play defense against Android malware; Stonesoft to air free 'Evader' detection tool read more »

Black hat vs white hat - the fight for the London 2012 Olympics

At the 2012 London Olympics this summer, hackers will be out in full force read more »

How to build multiple layers of security for your small business

How secure are you? Check out our checklist featuring common aspects of computer security read more »

more in depth ..
Black Hat Slideshows

10 new open source projects you may not know about

With so many open source software projects under way at any given moment, it can be difficult to keep tabs on all that's going on read more »

Best and worst celebrity technology moments of 2010

Lindsay Lohan, Lady Gaga and Stephen Colbert collide with Twitter, iPads and hackers. read more »

12 "white hat" hackers you should know

These IT security experts go looking for trouble and find it read more »

more slideshows ..
White Papers

Avoiding the 7 Deadly Sins of IT Security

Prevention is more important than detection read more »

What Do You Mean My Cloud Data Isn’t Secure?

Understanding your level of data protection read more »

more white papers ..

ComputerworldUK Knowledge Vault

ComputerworldUK
Share
x
Open