Cracked

Cracked News

Google rethinks webmail with Inbox, raising questions about Gmail's future

read more »

New European Commission, approved by Parliament, will focus on the digital domain

The European Parliament has put an end to uncertainty over who will direct the EU's policy on data protection and telecom regulations read more »

China again blames US for disrupted cybersecurity talks

A top Chinese official said the country does not tolerate hacking read more »

Once the FBI has a backdoor into your smartphone, everyone does

FBI director James Comey believes tech companies should be forced to insert back doors to bypass encryption on smartphones. But experts say once that happen,s security is moot and anyone can breach your privacy. read more »

Q&A: How Yik Yak wants to weed out abuse and become the next Twitter

Yik Yak CEO Tyler Droll and Chief Operating Officer Brooks Buffington lay out their vision read more »

Apple cracks top 5 global PC sellers list

Apple cracked the top five of IDC's list of global personal computer makers for the third quarter read more »

more news ..

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.


Windows 8

Windows 8

Check out our latest articles on Microsoft's next-generation operating system.


Securing the Enterprise

 Join ComputerworldUK's editor in chief, Mike Simons, and Dell executives in a series of video discussions on how to respond to cyver criminals.


HP acquisitions

HP acquisitions

Following HP's dispute with Autonomy, we look back at other HP acquisitions in this Computerworld UK slideshow.


Advertisement
Cracked In Depth

The STEM skills funding gap: Should corporations pick up the pieces?

Many corporations are plugging funding gaps for tech subjects that the government can't cover - but is it their responsibility? read more »

Why giving mobile apps banking info isn't as risky as it seems

The risks are no greater than transactions involving payment cards read more »

Sony seeks mobile rebirth, starting with Core sensor used in wearable tech

Sony on a quest to repeat Walkman success read more »

The 25 worst passwords of 2013

'Password' is dethroned but the new champion isn't much better read more »

NetSuite eyes European growth with data centre investment plan

US firm looks to boost slowing growth in UK, and establish itself in wider EMEA region read more »

BlackBerry 10 'make or break' for RIM

Research In Motion's new BlackBerry 10 operating system has been praised so far, but analysts say the company is riding on its success read more »

more in depth ..
Cracked Slideshows

The 10 worst people you meet working in IT

You're definitely going to meet them. Hopefully you aren't one of them. read more »

Black Hat 2014: How to crack just about everything

From mobile phones and cars to IPv6, security researchers have turned their skills against a world of technology read more »

Top 25 free tools for every Windows desktop

Whatever your poison -- Windows 7 or 8, updated or not -- there's a desktop tool just begging to become part of your repertoire read more »

The 10 biggest Edward Snowden leaks

One year ago, on June 5, 2013, The Washington Post published the first of Edward Snowden's leaks. Since then, many more revelations have come to light. Here are a look at 10 of the biggest. read more »

more slideshows ..
White Papers

Avoiding the 7 Deadly Sins of IT Security

Prevention is more important than detection read more »

What Do You Mean My Cloud Data Isn’t Secure?

Understanding your level of data protection read more »

more white papers ..

We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message

ComputerworldUK Knowledge Vault

ComputerworldUK
Share
x
Open