Encryption key

Encryption key News

China defends cybersecurity demands, amid complaints from US

Proposed security rules from China would demand US tech companies hand over sensitive technology to the government read more »

Box woos financial services firms with a tailored cloud offering

Compliance with FINRA regulatory standards is on the way read more »

Insurance firm Staysure fined £175,000 for 'unbelievable' credit card hack

ICO report uncovered chaotic security read more »

Flaw in popular Web analytics plug-in exposes WordPress sites to hacking

Attackers can easily crack cryptographic keys used by the WP-Slimstat plug-in and use them to read information from a site's database read more »

Lenovo admits to Superfish screw-up, will release clean-up tool

The company confirmed that a software program preloaded on some of its laptops exposes users to potential attacks read more »

Equation cyberspies use unrivaled, NSA-style techniques to hit Iran, Russia

The group's attack on hard-drive firmware is one of the most advanced ever discovered, Kaspersky Lab said read more »

more news ..
Encryption key Blogs

UK Surveillance: The Fightback Begins - Please Join

Another revelation about GCHQ's massive spying activities, plus two (small) victories read more »

Open Source's Secret - and Dangerous - Shame

Support these projects - or lose key freedoms read more »

To Counter Mass Surveillance, "SOS": Secure Open Source

Here's what we need to do read more »

Could Cameron Be So Stupid as to Undermine Encryption?

How to destroy liberty, online safety, commercial confidentiality and the UK tech startup scene with one sentence read more »

more blogs ..

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.


Windows 8

Windows 8

Check out our latest articles on Microsoft's next-generation operating system.


Securing the Enterprise

 Join ComputerworldUK's editor in chief, Mike Simons, and Dell executives in a series of video discussions on how to respond to cyver criminals.


HP acquisitions

HP acquisitions

Following HP's dispute with Autonomy, we look back at other HP acquisitions in this Computerworld UK slideshow.


Advertisement
Encryption key In Depth

The NSA is inside hard drive firmware - now what?

Experts agree firmware attacks are possible. But until the Equation group report nobody was worried read more »

GE Capital's CTO sees the death of PCs, the rise of phablets

Even though the term "phablet" draws a lot of snarky comments, GE Capital CTO Eric Reed thinks they'll overtake PCs in a few years. read more »

Big trends in big data analytics

Big data technologies and practices are moving quickly. Here's what you need to know to stay ahead of the game. read more »

How an SME overcame technical hurdles to work with government

How an SME is working to gain IL3 certification to enable it to make its mark in the government supplier pool read more »

Why giving mobile apps banking info isn't as risky as it seems

The risks are no greater than transactions involving payment cards read more »

Wearables: Are we handing more tools to Big Brother?

Fitness trackers and other wearables are all the rage, but privacy advocates warn that they come with the risk of a "privacy nightmare" read more »

more in depth ..
Encryption key Slideshows

Hot products at VMworld 2014

Click through all the products being released at VMworld last week read more »

Top 25 free tools for every Windows desktop

Whatever your poison -- Windows 7 or 8, updated or not -- there's a desktop tool just begging to become part of your repertoire read more »

The 8 scariest digital security stories of 2014 (so far)

The year's only halfway done, but hackers have already filled enough headlines to last a decade. read more »

The 10 biggest Edward Snowden leaks

One year ago, on June 5, 2013, The Washington Post published the first of Edward Snowden's leaks. Since then, many more revelations have come to light. Here are a look at 10 of the biggest. read more »

more slideshows ..
White Papers

Avoiding the 7 Deadly Sins of IT Security

Prevention is more important than detection read more »

What Do You Mean My Cloud Data Isn’t Secure?

Understanding your level of data protection read more »

more white papers ..

We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message