Encryption key News
A USB-stick computer built around a processor with strong security capabilities read more »
The cryptographic implementation is solid and cannot be compromsied through a remote server, the company said read more »
The new CA is called Let's Encrypt and its goal is to encourage the widespread adoption of SSL/TLS on the Internet read more »
Cybercriminals use freebie tactic in attempt to increase ransomware success rate read more »
Andy Jassy touts larger customer cloud deployments at the AWS user conference read more »
A vulnerability in the Microsoft SChannel component could expose servers to remote code execution attacks read more »more news ..
Encryption key Blogs
Mozilla's next 10 years read more »
Plus yet more security issues with cloud computing read more »
Attacking the Internet and its companies is not the way forward read more »more blogs ..
Watch this on demand webinar which explores IT innovation, managed print services and business agility.
Check out our latest articles on Microsoft's next-generation operating system.
Join ComputerworldUK's editor in chief, Mike Simons, and Dell executives in a series of video discussions on how to respond to cyver criminals.
Following HP's dispute with Autonomy, we look back at other HP acquisitions in this Computerworld UK slideshow.
Encryption key In Depth
Even though the term "phablet" draws a lot of snarky comments, GE Capital CTO Eric Reed thinks they'll overtake PCs in a few years. read more »
Big data technologies and practices are moving quickly. Here's what you need to know to stay ahead of the game. read more »
How an SME is working to gain IL3 certification to enable it to make its mark in the government supplier pool read more »
The risks are no greater than transactions involving payment cards read more »
Fitness trackers and other wearables are all the rage, but privacy advocates warn that they come with the risk of a "privacy nightmare" read more »
Cheating is on the rise, but IT certification programs are fighting back read more »more in depth ..
Encryption key Slideshows
Click through all the products being released at VMworld last week read more »
Whatever your poison -- Windows 7 or 8, updated or not -- there's a desktop tool just begging to become part of your repertoire read more »
The year's only halfway done, but hackers have already filled enough headlines to last a decade. read more »
One year ago, on June 5, 2013, The Washington Post published the first of Edward Snowden's leaks. Since then, many more revelations have come to light. Here are a look at 10 of the biggest. read more »more slideshows ..