Data security

Data security News

Reconnaissance code on industrial software site points to watering hole attack

Attackers are using a sophisticated Web-based tool to gather information on potential targets, researchers from AlienVault said read more »

Government launches managed email framework

Contract to be used immediately to replace secure NHS email system NHSmail provided by Microsoft read more »

European 700MHz band should be freed for mobile broadband by 2020, report says

The extra spectrum is needed to meet increasing demand for video on mobile devices read more »

East Midlands Ambulance Service loses patient data again

'Obsolete' device 'could be still on our premises' read more »

Backoff malware infections are more widespread than thought

The number of businesses hit by the data-stealing Backoff malware may be substantially more than the 1,000 or so companies estimated by federal officials. read more »

CryptoWall held over half-a-million computers hostage, encrypted 5 billion files

The gang behind this dangerous ransomware program has earned US$1 million so far, researchers from Dell SecureWorks said read more »

more news ..

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.


Windows 8

Windows 8

Check out our latest articles on Microsoft's next-generation operating system.


Securing the Enterprise

 Join ComputerworldUK's editor in chief, Mike Simons, and Dell executives in a series of video discussions on how to respond to cyver criminals.


HP acquisitions

HP acquisitions

Following HP's dispute with Autonomy, we look back at other HP acquisitions in this Computerworld UK slideshow.


Advertisement
Data security In Depth

Kicking the stool out from under the cybercrime economy

Cripple the automated processes presented by malware platforms and the threats aren't quite so serious read more »

Is the open plan office a data security headache?

Google and Facebook market their shared workspace and informality to potential recruits but... read more »

Moving toward smart and secure continuous software delivery

Agile development can highten tensions between security and development teams read more »

The mobile apps revolution is here to stay

Simplicity is key at the front and the back-end, writes Oracle's mobile strategy VP read more »

The making of a cybercrime market

Business analysis and online crime read more »

How risky will it be to run old IE after Microsoft's 2016 patch stoppage?

Older versions of the browser already contain fewer bugs than newer editions like IE11, analysis shows read more »

more in depth ..
Data security Slideshows

11 post-holiday checklist tips for CIOs

As the holiday period ends, it's a good time for your IT organisation to undertake some of those long put-off tasks. Here are tips from four CIOs and CTOs for cleaning up your IT environment. read more »

7 far-out technologies that are closer than you think

Some of these technology innovations sound like science fiction, but they may land in your data centre sooner than you'd imagine read more »

The 10 most terrifying security nightmares revealed at the Black Hat and Def Con hacker conferences

Hacked planes. Unstoppable, utterly malicious flash drives. Hotel automation gone crazy. These are the 10 most terrifying security stories out of the premier hacker and security conferences in Las Vegas. read more »

Black Hat 2014: How to crack just about everything

From mobile phones and cars to IPv6, security researchers have turned their skills against a world of technology read more »

more slideshows ..
White Papers

Avoiding the 7 Deadly Sins of IT Security

Prevention is more important than detection read more »

What Do You Mean My Cloud Data Isn’t Secure?

Understanding your level of data protection read more »

more white papers ..

We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message

ComputerworldUK Knowledge Vault

ComputerworldUK
Share
x
Open